Description
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
Published: 2018-06-26
Score: 7.5 High
EPSS: 7.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4278-1 jetty9 security update
EUVD EUVD EUVD-2018-0544 In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
Github GHSA Github GHSA GHSA-84q7-p226-4x5w Jetty vulnerable to cache poisoning due to inconsistent HTTP request handling (HTTP Request Smuggling)
History

No history.

Subscriptions

Debian Debian Linux
Eclipse Jetty
Redhat Jboss Data Grid
cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2024-08-05T16:12:27.819Z

Reserved: 2017-04-11T00:00:00.000Z

Link: CVE-2017-7656

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-26T15:29:00.217

Modified: 2024-11-21T03:32:23.400

Link: CVE-2017-7656

cve-icon Redhat

Severity : Important

Publid Date: 2018-06-07T00:00:00Z

Links: CVE-2017-7656 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses