Eclipse

Jetty

47 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.22%
  • Veröffentlicht 07.07.2022 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:13

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service s...

  • EPSS 1.15%
  • Veröffentlicht 07.07.2022 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:13

In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead...

Exploit
  • EPSS 93.78%
  • Veröffentlicht 15.07.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:10:23

For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerabilit...

  • EPSS 0.27%
  • Veröffentlicht 22.06.2021 15:15:16
  • Zuletzt bearbeitet 21.11.2024 06:10:23

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and mul...

  • EPSS 90.26%
  • Veröffentlicht 09.06.2021 02:15:06
  • Zuletzt bearbeitet 21.11.2024 05:59:14

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml...

Exploit
  • EPSS 11.99%
  • Veröffentlicht 01.04.2021 15:15:14
  • Zuletzt bearbeitet 27.08.2025 21:15:37

In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.

Exploit
  • EPSS 93.49%
  • Veröffentlicht 01.04.2021 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:59:13

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 01.04.2021 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:59:12

In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps thems...

  • EPSS 33.82%
  • Veröffentlicht 26.02.2021 22:15:19
  • Zuletzt bearbeitet 20.08.2025 10:15:27

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...

  • EPSS 0.6%
  • Veröffentlicht 28.11.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 05:20:52

In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...