Eclipse

Jetty

42 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.83%
  • Published 15.09.2023 20:15:09
  • Last modified 21.11.2024 08:18:54

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RF...

Exploit
  • EPSS 0.86%
  • Published 15.09.2023 19:15:08
  • Last modified 27.05.2025 21:20:37

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Se...

  • EPSS 0.32%
  • Published 18.04.2023 21:15:09
  • Last modified 21.11.2024 07:50:39

Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty ...

  • EPSS 41.17%
  • Published 18.04.2023 21:15:08
  • Last modified 21.11.2024 07:50:39

Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemory...

Exploit
  • EPSS 0.49%
  • Published 07.07.2022 21:15:10
  • Last modified 21.11.2024 07:00:30

In Eclipse Jetty versions 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, SslConnection does not release ByteBuffers from configured ByteBufferPool in case of error code paths.

  • EPSS 1.33%
  • Published 07.07.2022 21:15:10
  • Last modified 21.11.2024 07:00:13

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service s...

  • EPSS 1.22%
  • Published 07.07.2022 21:15:10
  • Last modified 21.11.2024 07:00:13

In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead...

Exploit
  • EPSS 93.8%
  • Published 15.07.2021 17:15:08
  • Last modified 21.11.2024 06:10:23

For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerabilit...

  • EPSS 0.51%
  • Published 22.06.2021 15:15:16
  • Last modified 21.11.2024 06:10:23

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and mul...

  • EPSS 92.42%
  • Published 09.06.2021 02:15:06
  • Last modified 21.11.2024 05:59:14

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml...