fix(deps): update dependency org.eclipse.jetty:jetty-http to v12 [security]#104
Open
fix(deps): update dependency org.eclipse.jetty:jetty-http to v12 [security]#104
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
9.4.55.v20240627→12.0.12Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Eclipse Jetty URI parsing of invalid authority
CVE-2024-6763 / GHSA-qh8g-58pp-2wxh
More information
Details
Summary
Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class,
HttpURI, for URI/URL parsing.The
HttpURIclass does insufficient validation on the authority segment of a URI. However the behaviour ofHttpURIdiffers from the common browsers in how it handles a URI that would be considered invalid if fully validated against the RRC. SpecificallyHttpURIand the browser may differ on the value of the host extracted from an invalid URI and thus a combination of Jetty and a vulnerable browser may be vulnerable to a open redirect attack or to a SSRF attack if the URI is used after passing validation checks.Details
Affected components
The vulnerable component is the
HttpURIclass when used as a utility class in an application. The Jetty usage of the class is not vulnerable.Attack overview
The
HttpURIclass does not well validate the authority section of a URI. When presented with an illegal authority that may contain user info (eg username:password#@hostname:port), then the parsing of the URI is not failed. Moreover, the interpretation of what part of the authority is the host name differs from a common browser in that they also do not fail, but they select a different host name from the illegal URI.Attack scenario
A typical attack scenario is illustrated in the diagram below. The Validator checks whether the attacker-supplied URL is on the blocklist. If not, the URI is passed to the Requester for redirection. The Requester is responsible for sending requests to the hostname specified by the URI.
This attack occurs when the Validator is the
org.eclipse.jetty.http.HttpURIclass and the Requester is theBrowser(include chrome, firefox and Safari). An attacker can send a malformed URI to the Validator (e.g.,http://browser.check%23%40vulndetector.com/). After validation, the Validator finds that the hostname is not on the blocklist. However, the Requester can still send requests to the domain with the hostnamevulndetector.com.PoC
payloads:
The problem of 302 redirect parsing in HTML tag scenarios. Below is a poc example. After clicking the button, the browser will open "browser.check", and jetty will parse this URL as "vulndetector.com".
A comparison of the parsing differences between Jetty and chrome is shown in the table below (note that neither should accept the URI as valid).
The problem of 302 redirect parsing in HTTP 302 Location
It is noteworthy that Spring Web also faced similar security vulnerabilities, being affected by the aforementioned four types of payloads. These issues have since been resolved and have been assigned three CVE numbers [3-5].
Impact
The impact of this vulnerability is limited to developers that use the Jetty HttpURI directly. Example: your project implemented a blocklist to block on some hosts based on HttpURI's handling of authority section. The vulnerability will help attackers bypass the protections that developers have set up for hosts. The vulnerability will lead to SSRF[1] and URL Redirection[2] vulnerabilities in several cases.
Mitigation
The attacks outlined above rely on decoded user data being passed to the
HttpURIclass. Application should not pass decoded user data as an encoded URI to any URI class/method, includingHttpURI. Such applications are likely to be vulnerable in other ways.The immediate solution is to upgrade to a version of the class that will fully validate the characters of the URI authority. Ultimately, Jetty will deprecate and remove support for user info in the authority per RFC9110 Section 4.2.4.
Note that the Chrome (and other browsers) parse the invalid user info section improperly as well (due to flawed WhatWG URL parsing rules that do not apply outside of a Web Browser).
Reference
[1] https://cwe.mitre.org/data/definitions/918.html
[2] https://cwe.mitre.org/data/definitions/601.html
Severity
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Jetty has HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
CVE-2026-2332 / GHSA-355h-qmc2-wpwf
More information
Details
Description (as reported)
Jetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks.
Background
This vulnerability is a new variant discovered while researching the "Funky Chunks" HTTP request smuggling techniques:
The original research tested various chunk extension parsing differentials but did not test quoted-string handling within extension values.
Technical Details
RFC 9112 Section 7.1.1 defines chunked transfer encoding:
RFC 9110 Section 5.6.4 defines quoted-string:
A quoted-string continues until the closing DQUOTE, and
\r\nsequences are not permitted within the quotes.Vulnerability
Jetty terminates chunk header parsing at
\r\ninside quoted strings instead of treating this as an error.Expected (RFC compliant):
Actual (jetty):
Proof of Concept
Result: Server returns 2 HTTP responses from a single TCP connection.
Parsing Breakdown
Impact
Reproduction
Suggested Fix
Ensure the chunk framing and extensions are parsed exactly as specified in RFC9112.
A CRLF inside a quoted-string should be considered a parsing error and not a line terminator.
Patches
No patches yet.
Workarounds
No workarounds yet.
Severity
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: (in timezone Europe/Rome)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate.