CVE-2009-4611 – org.mortbay.jetty:jetty
Package
Manager: maven
Name: org.mortbay.jetty:jetty
Vulnerable Version: >=6.0.0 <6.1.23 || >=7.0.0 <7.0.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00664 pctl0.70325
Details
Improper input validation in Mort Bay Jetty Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.
Metadata
Created: 2022-05-02T03:56:13Z
Modified: 2022-06-10T22:42:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6jxp-7g74-2rc3/GHSA-6jxp-7g74-2rc3.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-6jxp-7g74-2rc3
Finding: F184
Auto approve: 1