Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Eclipse Jetty Vulnerability - CVE-2019-17638 (Windows)

Information

Severity

Severity

High

Family

Family

Web Servers

CVSSv2 Base

CVSSv2 Base

7.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:H/Au:N/C:C/I:C/A:P

Solution Type

Solution Type

None Solution Available

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Eclipse Jetty is prone to a vulnerability where sensitive information about clients could be obtained.

Insight

Insight

In case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).

Affected Software

Affected Software

Eclipse Jetty version 9.4.27.v20200227 to 9.4.29.v20200521.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

No known solution is available as of 15th July, 2020. Information regarding this issue will be updated once solution details are available.

Common Vulnerabilities and Exposures (CVE)