CVE-2006-6969 – org.eclipse.jetty:jetty-server
Package
Manager: maven
Name: org.eclipse.jetty:jetty-server
Vulnerable Version: >=0 <4.2.27 || >=5.1.0 <5.1.12 || >=6.0.0 <6.0.2 || >=6.1.0pre1 <6.1.0pre3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0064 pctl0.69658
Details
Jetty Uses Predictable Session Identifiers Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
Metadata
Created: 2022-05-01T07:43:29Z
Modified: 2024-02-12T16:20:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jg2x-r643-w2ch/GHSA-jg2x-r643-w2ch.json
CWE IDs: ["CWE-330"]
Alternative ID: GHSA-jg2x-r643-w2ch
Finding: F034
Auto approve: 1