Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5507-1 jetty9 security update
EUVD EUVD EUVD-2023-2569 Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.
Github GHSA Github GHSA GHSA-pwh8-58vv-vw48 Jetty's OpenId Revoked authentication allows one request
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 27 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-13T17:09:04.719Z

Reserved: 2023-09-04T16:31:48.226Z

Link: CVE-2023-41900

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.380Z

cve-icon NVD

Status : Modified

Published: 2023-09-15T21:15:11.600

Modified: 2024-11-21T08:21:53.187

Link: CVE-2023-41900

cve-icon Redhat

Severity : Low

Publid Date: 2023-09-14T00:00:00Z

Links: CVE-2023-41900 - Bugzilla

cve-icon OpenCVE Enrichment

No data.