9.8

CVE-2017-7658

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Data is provided by the National Vulnerability Database (NVD)
EclipseJetty Version <= 9.2.26
EclipseJetty Version >= 9.3.0 < 9.3.24
EclipseJetty Version >= 9.4.0 < 9.4.11
DebianDebian Linux Version9.0
OracleRest Data Services Version11.2.0.4 SwEdition-
OracleRest Data Services Version12.1.0.2 SwEdition-
OracleRest Data Services Version12.2.0.1 SwEdition-
OracleRest Data Services Version18c SwEdition-
OracleRetail Xstore Payment Version3.3
HpXp P9000 Command View SwEditionadvanced Version >= 8.4.0-00 <= 8.6.2-00
   HpXp P9000 Version-
NetappE-series Santricity Os Controller Version >= 11.0 <= 11.50.1
NetappHci Storage Node Version-
NetappOncommand System Manager Version >= 3.0 <= 3.1.3
NetappSnapcenter Version-
NetappSnapmanager Version- SwPlatformoracle
NetappSnapmanager Version- SwPlatformsap
NetappSolidfire Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 11.35% 0.933
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.

http://www.securitytracker.com/id/1041194
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/106566
Third Party Advisory
VDB Entry