-
Notifications
You must be signed in to change notification settings - Fork 1
Description
CVE-2016-4800 - High Severity Vulnerability
Vulnerable Libraries - jetty-server-9.1.0.v20131115.jar, jetty-util-9.1.0.v20131115.jar
jetty-server-9.1.0.v20131115.jar
path: 2/repository/org/eclipse/jetty/jetty-server/9.1.0.v20131115/jetty-server-9.1.0.v20131115.jar
Library home page: http://www.eclipse.org/jetty
Dependency Hierarchy:
- ❌ jetty-server-9.1.0.v20131115.jar (Vulnerable Library)
jetty-util-9.1.0.v20131115.jar
path: /root/.m2/repository/org/eclipse/jetty/jetty-util/9.1.0.v20131115/jetty-util-9.1.0.v20131115.jar
Library home page: http://www.eclipse.org/jetty
Dependency Hierarchy:
- jetty-server-9.1.0.v20131115.jar (Root Library)
- jetty-http-9.1.0.v20131115.jar
- ❌ jetty-util-9.1.0.v20131115.jar (Vulnerable Library)
- jetty-http-9.1.0.v20131115.jar
Found in commit: f396e60bf74726f66a202d308a1f2865177e4bee
Vulnerability Details
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
Publish Date: 2017-04-13
URL: CVE-2016-4800
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-4800
Release Date: 2017-12-31
Fix Resolution: Upgrade to version jetty 9.3.9 or greater
Step up your Open Source Security Game with WhiteSource here