cvelist/2017/7xxx/CVE-2017-7658.json

124 lines
5.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-10-16 18:01:15 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@eclipse.org",
"ID": "CVE-2017-7658",
"STATE": "PUBLIC"
2019-03-18 01:39:01 +00:00
},
2019-10-16 18:01:15 +00:00
"affects": {
"vendor": {
"vendor_data": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"product": {
"product_data": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"product_name": "Eclipse Jetty",
"version": {
"version_data": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"version_affected": "<",
"version_value": "9.2.25"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"version_affected": ">=",
"version_value": "9.3.0"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"version_affected": "<",
"version_value": "9.3.24"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"version_affected": ">=",
"version_value": "9.4.0"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"version_affected": "<",
"version_value": "9.4.11"
2019-03-18 01:39:01 +00:00
}
]
}
}
]
},
2019-10-16 18:01:15 +00:00
"vendor_name": "The Eclipse Foundation"
2019-03-18 01:39:01 +00:00
}
]
}
},
2019-10-16 18:01:15 +00:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-01-16 14:04:51 -05:00
{
2019-10-16 18:01:15 +00:00
"lang": "eng",
"value": "In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization."
2019-01-16 14:04:51 -05:00
}
2019-03-18 01:39:01 +00:00
]
},
2019-10-16 18:01:15 +00:00
"problemtype": {
"problemtype_data": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"description": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"lang": "eng",
"value": "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')"
2019-03-18 01:39:01 +00:00
}
]
}
]
},
2019-10-16 18:01:15 +00:00
"references": {
"reference_data": [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"name": "DSA-4278",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4278"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669",
"refsource": "CONFIRM",
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"name": "1041194",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041194"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"name": "106566",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106566"
2019-03-18 01:39:01 +00:00
},
{
2019-10-16 18:01:15 +00:00
"name": "https://security.netapp.com/advisory/ntap-20181014-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181014-0001/"
2019-08-21 01:00:47 +00:00
},
2019-11-12 20:01:53 +00:00
{
"refsource": "MLIST",
"name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
"url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
},
2019-08-21 01:00:47 +00:00
{
2019-10-16 18:01:15 +00:00
"refsource": "MLIST",
"name": "[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar",
"url": "https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E"
2019-08-22 00:00:47 +00:00
},
{
2019-10-16 18:01:15 +00:00
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us"
Bill Situ <Bill.Situ@Oracle.com> Update 3rd party CVEs for 2019 Oracl CPU October On branch cna/Oracle/CPU2019Oct Changes to be committed: modified: 2015/5xxx/CVE-2015-5180.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0729.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/5xxx/CVE-2016-5425.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/16xxx/CVE-2017-16531.json modified: 2017/17xxx/CVE-2017-17558.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/6xxx/CVE-2017-6056.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/1000xxx/CVE-2018-1000007.json modified: 2018/1000xxx/CVE-2018-1000120.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/11xxx/CVE-2018-11798.json modified: 2018/12xxx/CVE-2018-12384.json modified: 2018/12xxx/CVE-2018-12404.json modified: 2018/12xxx/CVE-2018-12536.json modified: 2018/12xxx/CVE-2018-12538.json modified: 2018/12xxx/CVE-2018-12545.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/16xxx/CVE-2018-16842.json modified: 2018/18xxx/CVE-2018-18065.json modified: 2018/18xxx/CVE-2018-18066.json modified: 2018/19xxx/CVE-2018-19360.json modified: 2018/19xxx/CVE-2018-19361.json modified: 2018/19xxx/CVE-2018-19362.json modified: 2018/1xxx/CVE-2018-1320.json modified: 2018/20xxx/CVE-2018-20685.json modified: 2018/7xxx/CVE-2018-7185.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8034.json modified: 2018/8xxx/CVE-2018-8037.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0196.json modified: 2019/0xxx/CVE-2019-0197.json modified: 2019/0xxx/CVE-2019-0211.json modified: 2019/0xxx/CVE-2019-0215.json modified: 2019/0xxx/CVE-2019-0217.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0232.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10098.json modified: 2019/10xxx/CVE-2019-10241.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11068.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/1xxx/CVE-2019-1543.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1559.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/3xxx/CVE-2019-3855.json modified: 2019/3xxx/CVE-2019-3856.json modified: 2019/3xxx/CVE-2019-3857.json modified: 2019/3xxx/CVE-2019-3858.json modified: 2019/3xxx/CVE-2019-3859.json modified: 2019/3xxx/CVE-2019-3860.json modified: 2019/3xxx/CVE-2019-3861.json modified: 2019/3xxx/CVE-2019-3862.json modified: 2019/3xxx/CVE-2019-3863.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/6xxx/CVE-2019-6109.json modified: 2019/6xxx/CVE-2019-6111.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9517.json modified: 2019/9xxx/CVE-2019-9936.json modified: 2019/9xxx/CVE-2019-9937.json
2019-10-15 13:33:48 -07:00
},
{
2019-10-16 18:01:15 +00:00
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
2019-03-18 01:39:01 +00:00
}
]
}
}