2017-10-16 12:31:07 -04:00
{
2019-10-16 18:01:15 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "security@eclipse.org" ,
"ID" : "CVE-2017-7658" ,
"STATE" : "PUBLIC"
2019-03-18 01:39:01 +00:00
} ,
2019-10-16 18:01:15 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"product" : {
"product_data" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"product_name" : "Eclipse Jetty" ,
"version" : {
"version_data" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"version_affected" : "<" ,
"version_value" : "9.2.25"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"version_affected" : ">=" ,
"version_value" : "9.3.0"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"version_affected" : "<" ,
"version_value" : "9.3.24"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"version_affected" : ">=" ,
"version_value" : "9.4.0"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"version_affected" : "<" ,
"version_value" : "9.4.11"
2019-03-18 01:39:01 +00:00
}
]
}
}
]
} ,
2019-10-16 18:01:15 +00:00
"vendor_name" : "The Eclipse Foundation"
2019-03-18 01:39:01 +00:00
}
]
}
} ,
2019-10-16 18:01:15 +00:00
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2019-01-16 14:04:51 -05:00
{
2019-10-16 18:01:15 +00:00
"lang" : "eng" ,
"value" : "In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization."
2019-01-16 14:04:51 -05:00
}
2019-03-18 01:39:01 +00:00
]
} ,
2019-10-16 18:01:15 +00:00
"problemtype" : {
"problemtype_data" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"description" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"lang" : "eng" ,
"value" : "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')"
2019-03-18 01:39:01 +00:00
}
]
}
]
} ,
2019-10-16 18:01:15 +00:00
"references" : {
"reference_data" : [
2019-03-18 01:39:01 +00:00
{
2019-10-16 18:01:15 +00:00
"name" : "DSA-4278" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2018/dsa-4278"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"name" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"name" : "1041194" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1041194"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"name" : "106566" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/106566"
2019-03-18 01:39:01 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"name" : "https://security.netapp.com/advisory/ntap-20181014-0001/" ,
"refsource" : "CONFIRM" ,
"url" : "https://security.netapp.com/advisory/ntap-20181014-0001/"
2019-08-21 01:00:47 +00:00
} ,
2019-11-12 20:01:53 +00:00
{
"refsource" : "MLIST" ,
"name" : "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report" ,
"url" : "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
} ,
2019-08-21 01:00:47 +00:00
{
2019-10-16 18:01:15 +00:00
"refsource" : "MLIST" ,
"name" : "[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar" ,
"url" : "https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E"
2019-08-22 00:00:47 +00:00
} ,
{
2019-10-16 18:01:15 +00:00
"refsource" : "CONFIRM" ,
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us" ,
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us"
2019-10-15 13:33:48 -07:00
} ,
{
2019-10-16 18:01:15 +00:00
"url" : "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
2019-11-16 02:02:07 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities" ,
"url" : "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E"
2020-07-29 12:01:25 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image" ,
"url" : "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
2020-10-20 12:39:21 -07:00
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2020.html"
2019-03-18 01:39:01 +00:00
}
]
}
}