CVE-2017-7656HTTP Request Smuggling in Eclipse Foundation Eclipse Jetty

Severity
7.5HIGHNVD
EPSS
7.8%
top 8.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 26
Latest updateNov 21

Description

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HT

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDeclipse/jetty9.3.09.3.24+2
CVEListV5the_eclipse_foundation/eclipse_jetty9.3.0unspecified+4

Also affects: Debian Linux 9.0

🔴Vulnerability Details

4
OSV
Jetty vulnerable to cache poisoning due to inconsistent HTTP request handling (HTTP Request Smuggling)2018-10-19
GHSA
Jetty vulnerable to cache poisoning due to inconsistent HTTP request handling (HTTP Request Smuggling)2018-10-19
CVEList
CVE-2017-7656: In Eclipse Jetty, versions 92018-06-26
OSV
CVE-2017-7656: In Eclipse Jetty, versions 92018-06-26

📋Vendor Advisories

3
Atlassian
CVE-2017-7656: Cache Poisoning org.eclipse.jetty:jetty-server in Jira Software Data Center and Server2023-11-21
Red Hat
jetty: HTTP request smuggling using the range header2018-06-07
Debian
CVE-2017-7656: jetty9 - In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4....2017

💬Community

2
Bugzilla
CVE-2017-7656 jetty: HTTP request smuggling using the range header2018-06-27
Bugzilla
CVE-2017-7656 CVE-2017-7657 CVE-2017-7658 jetty: various flaws [fedora-all]2018-06-27
CVE-2017-7656 — HTTP Request Smuggling | cvebase