blob: af7830b55110994a9945144b0010c0e4dd08dab3 [file] [log] [blame]
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Jetty Security Reports</title><link rel="stylesheet" type="text/css" href="css/docbook.css"><meta name="generator" content="DocBook XSL-NS Stylesheets V1.76.1"><meta name="keywords" content="jetty, servlet, servlet-api, cometd, http, websocket, eclipse, maven, java, server, software"><link rel="home" href="index.html" title="Jetty : The Definitive Reference"><link rel="up" href="troubleshooting.html" title="Chapter&nbsp;35.&nbsp;Troubleshooting"><link rel="prev" href="preventing-memory-leaks.html" title="Preventing Memory Leaks"><link xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times" rel="shortcut icon" href="images/favicon.ico"><script type="text/javascript" src="js/shCore.js"></script><script type="text/javascript" src="js/shBrushJava.js"></script><script type="text/javascript" src="js/shBrushXml.js"></script><script type="text/javascript" src="js/shBrushBash.js"></script><script type="text/javascript" src="js/shBrushJScript.js"></script><script type="text/javascript" src="js/shBrushSql.js"></script><script type="text/javascript" src="js/shBrushProperties.js"></script><script type="text/javascript" src="js/shBrushPlain.js"></script><link type="text/css" rel="stylesheet" href="css/shCore.css"><link type="text/css" rel="stylesheet" href="css/shThemeEclipse.css"><link type="text/css" rel="stylesheet" href="css/font-awesome.min.css"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><table xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times"><tr><td style="width: 25%"><a href="http://www.eclipse.org/jetty"><img src="images/jetty-header-logo.png" alt="Jetty Logo"></a><br><span style="font-size: small">
Version: 9.3.0.v20150612</span></td><td style="width: 50%"><script type="text/javascript"> (function() {
var cx = '016459005284625897022:obd4lsai2ds';
var gcse = document.createElement('script');
gcse.type = 'text/javascript';
gcse.async = true;
gcse.src = (document.location.protocol == 'https:' ? 'https:' : 'http:') +
'//www.google.com/cse/cse.js?cx=' + cx;
var s = document.getElementsByTagName('script')[0];
s.parentNode.insertBefore(gcse, s);
})();
</script><gcse:search></gcse:search></td></tr></table><div xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times" class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Jetty Security Reports</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="preventing-memory-leaks.html"><i class="icon-chevron-left"></i> Previous</a>&nbsp;</td><th width="60%" align="center">Chapter&nbsp;35.&nbsp;Troubleshooting<br><a accesskey="p" href="index.html"><i class="icon-home"></i> Home</a></th><td width="20%" align="right">&nbsp;</td></tr></table><hr></div><div xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times" class="jetty-callout"><h5 class="callout"><a href="http://www.webtide.com/">Contact the core Jetty developers at
<span class="website">www.webtide.com</span></a></h5><p>
private support for your internal/customer projects ... custom extensions and distributions ... versioned snapshots for indefinite support ...
scalability guidance for your apps and Ajax/Comet projects ... development services from 1 day to full product delivery
</p></div><div class="section"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="security-reports"></a>Jetty Security Reports</h2></div></div></div><p>The following sections provide information about Jetty security
issues.</p><div class="table"><a name="d0e26293"></a><p class="title"><b>Table&nbsp;35.1.&nbsp;Resolved Issues</b></p><div class="table-contents"><table summary="Resolved Issues" border="1"><colgroup><col><col><col><col><col><col><col></colgroup><thead><tr><th>yyyy/mm/dd</th><th>ID</th><th>Exploitable</th><th>Severity</th><th>Affects</th><th>Fixed Version</th><th>Comment</th></tr></thead><tbody><tr><td>2015/02/24</td><td>CVE-2015-2080</td><td>high</td><td>high</td><td>&gt;=9.2.3 &lt;9.2.9</td><td>9.2.9</td><td><a class="link" href="http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html" target="_top">JetLeak
exposure of past buffers during HttpParser error</a></td></tr><tr><td>2013/11/27</td><td><a class="link" href="http://en.securitylab.ru/lab/PT-2013-65" target="_top">PT-2013-65</a></td><td>medium</td><td>high</td><td>&gt;=9.0.0 &lt;9.0.5</td><td>9.0.6 <a class="link" href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=418014" target="_top">418014</a></td><td>Alias checking disabled by NTFS errors on Windows.</td></tr><tr><td>2013/07/24</td><td><a class="link" href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=413684" target="_top">413684</a></td><td>low</td><td>medium</td><td>&gt;=7.6.9 &lt;9.0.5</td><td>7.6.13,8.1.13,9.0.5 <a class="link" href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=413684" target="_top">413684</a></td><td>Constraints bypassed if unix symlink alias checker used on
windows</td></tr><tr><td>2011/12/29</td><td><a class="link" href="http://www.ocert.org/advisories/ocert-2011-003.html" target="_top">CERT2011-003</a><a class="link" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4461" target="_top">CVE-2011-4461</a></td><td>high</td><td>medium</td><td>All versions</td><td>7.6.0.RCO <a class="link" href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=367638" target="_top">Jetty-367638</a></td><td>Added ContextHandler.setMaxFormKeys (intkeys) to limit the
number of parameters (default 1000).</td></tr><tr><td>2009/11/05</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/120541" target="_top">CERT2011-003</a><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" target="_top">CERT2011-003</a></td><td>medium</td><td>high</td><td>JVM&lt;1.6u19</td><td>jetty-7.01.v20091125, jetty-6.1.22</td><td>Work around by turning off SSL renegotiation in Jetty. If
using JVM &gt; 1.6u19 setAllowRenegotiate(true) may be called on
connectors.</td></tr><tr><td>2009/06/18</td><td><a class="link" href="http://jira.codehaus.org/browse/JETTY-1042" target="_top">Jetty-1042</a></td><td>low</td><td>high</td><td>&lt;=6.1.18, &lt;=7.0.0.M4</td><td>6.1.19, 7.0.0.Rc0</td><td>Cookie leak between requests sharing a connection.</td></tr><tr><td>2009/04/30</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/402580" target="_top">CERT402580</a></td><td>medium</td><td>high</td><td>&lt;=6.1.16, &lt;=7.0.0.M2</td><td><p>5.1.15, 6.1.18, 7.0.0.M2</p><p><a class="link" href="http://jira.codehaus.org/browse/JETTY-1004" target="_top">Jetty-1004</a></p></td><td>View arbitrary disk content in some specific
configurations.</td></tr><tr><td>2007/12/22</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/553235" target="_top">CERT553235</a><a class="link" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6672" target="_top">CVE-2007-6672</a></td><td>high</td><td>medium</td><td>6.1.rrc0-6.1.6</td><td><p>6.1.7</p><p><a class="link" href="http://jira.codehaus.org/browse/JETTY-386" target="_top">CERT553235</a></p></td><td>Static content visible in WEB-INF and past security
constraints.</td></tr><tr><td>2007/11/05</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/438616" target="_top">CERT438616</a><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5614" target="_top">CVE-2007-5614</a></td><td>low</td><td>low</td><td>&lt;6.1.6</td><td>6.1.6rc1 (patch in CVS for jetty5)</td><td>Single quote in cookie name.</td></tr><tr><td>2007/11/05</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/237888" target="_top">CERT237888&gt;</a><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5613" target="_top">CVE-2007-5613</a></td><td>low</td><td>low</td><td>&lt;6.1.6</td><td>6.1.6rc0 (patch in CVS for jetty5)</td><td>XSS in demo dup servlet.</td></tr><tr><td>2007/11/03</td><td><a class="link" href="http://www.kb.cert.org/vuls/id/212984" target="_top">CERT212984
&gt;</a><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5615" target="_top">CVE-2007-5615</a></td><td>medium</td><td>medium</td><td>&lt;6.1.6</td><td>6.1.6rc0 (patch in CVS for jetty5)</td><td>CRLF Response splitting.</td></tr><tr><td>2006/11/22</td><td><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6969" target="_top">CVE-2006-6969</a></td><td>low</td><td>high</td><td>&lt;6.1.0, &lt;6.0.2, &lt;5.1.12, &lt;4.2.27</td><td>6.1.0pre3, 6.0.2, 5.1.12, 4.2.27</td><td>Session ID predictability.</td></tr><tr><td>2006/06/01</td><td><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2759" target="_top">CVE-2006-2759</a></td><td>medium</td><td>medium</td><td>&lt;6.0.*, &lt;6.0.0Beta17</td><td>6.0.0Beta17</td><td>JSP source visibility.</td></tr><tr><td>2006/01/05</td><td>&nbsp;</td><td>medium</td><td>medium</td><td>&lt;5.1.10</td><td>5.1.10</td><td>Fixed //security constraint bypass on Windows.</td></tr><tr><td>2005/11/18</td><td><a class="link" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2758" target="_top">CVE-2006-2758</a></td><td>medium</td><td>medium</td><td>&lt;5.1.6</td><td>5.1.6, 6.0.0Beta4</td><td>JSP source visibility.</td></tr><tr><td>2004/02/04</td><td>JSSE 1.0.3_01</td><td>medium</td><td>medium</td><td>&lt;4.2.7</td><td>4.2.7</td><td>Upgraded JSSE to obtain downstream security fix.</td></tr><tr><td>2002/09/22</td><td>&nbsp;</td><td>high</td><td>high</td><td>&lt;4.1.0</td><td>4.1.0</td><td>Fixed CGI servlet remove exploit.</td></tr><tr><td>2002/03/12</td><td>&nbsp;</td><td>medium</td><td>&nbsp;</td><td>&lt;3.1.7</td><td>4.0.RC2, 3.1.7</td><td>Fixed // security constraint bypass.</td></tr><tr><td>2001/10/21</td><td>medium</td><td>&nbsp;</td><td>high</td><td>&lt;3.1.3</td><td>3.1.3</td><td>Fixed trailing null security constraint bypass.</td></tr></tbody></table></div></div><br class="table-break"></div><script type="text/javascript">
SyntaxHighlighter.all()
</script><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="preventing-memory-leaks.html"><i class="icon-chevron-left"></i> Previous</a>&nbsp;</td><td width="20%" align="center"><a accesskey="u" href="troubleshooting.html"><i class="icon-chevron-up"></i> Top</a></td><td width="40%" align="right">&nbsp;</td></tr><tr><td width="40%" align="left" valign="top">Preventing Memory Leaks&nbsp;</td><td width="20%" align="center"><a accesskey="h" href="index.html"><i class="icon-home"></i> Home</a></td><td width="40%" align="right" valign="top">&nbsp;</td></tr></table></div><p xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times"><div class="jetty-callout">
See an error or something missing?
<span class="callout"><a href="http://github.com/jetty-project/jetty-documentation">Contribute to this documentation at
<span class="website"><i class="icon-github"></i> Github!</span></a></span><span style="float: right"><i>(Generated: 2015-06-15T13:18:56-05:00)</i></span></div></p><script xmlns:jfetch="java:org.eclipse.jetty.xslt.tools.JavaSourceFetchExtension" xmlns:fetch="java:org.eclipse.jetty.xslt.tools.SourceFetchExtension" xmlns:d="http://docbook.org/ns/docbook" xmlns:l="http://docbook.sourceforge.net/xmlns/l10n/1.0" xmlns:xslthl="http://xslthl.sf.net" xmlns:gcse="http://www.google.com" xmlns:date="http://exslt.org/dates-and-times" type="text/javascript">
var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-1149868-7']);
_gaq.push(['_trackPageview']);
(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);
})();
</script></body></html>