Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Eclipse Jetty Gzip Vulnerability (Windows)

Information

Severity

Severity

Medium

Family

Family

Web Servers

CVSSv2 Base

CVSSv2 Base

4.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Eclipse Jetty is prone to a vulnerability where the buffer is not correctly recycled in Gzip Request inflation.

Insight

Insight

If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request on the same connection will see that body prepended to it's body. The attacker will not see any data, but may inject data into the body of the subsequent request.

Affected Software

Affected Software

Eclipse Jetty versions 9.4.0.RC0 - 9.4.34.v20201102, 10.0.0.alpha0 - 10.0.0.beta2 and 11.0.0.alpha0 - 11.0.0.beta2.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to versions 9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3 or later.

Common Vulnerabilities and Exposures (CVE)