|Title:||Eclipse Jetty Vulnerability - CVE-2019-17638 (Linux)|
|Summary:||Eclipse Jetty is prone to a vulnerability where sensitive information about; clients could be obtained.|
Eclipse Jetty is prone to a vulnerability where sensitive information about
clients could be obtained.
In case of too large response headers, Jetty throws an exception to produce
an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to
the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the
pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer
with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results
in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data
belonging to client2 (HTTP session ids, authentication credentials, etc.).
Eclipse Jetty version 9.4.27.v20200227 to 9.4.29.v20200521.
No known solution is available as of 15th July, 2020.
Information regarding this issue will be updated once solution details are available.
Common Vulnerability Exposure (CVE) ID: CVE-2019-17638|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.