Lucene search

K
amazonAmazonALAS-2024-2394
HistoryJan 03, 2024 - 9:04 p.m.

Medium: jetty

2024-01-0321:04:00
alas.aws.amazon.com
15
eclipse jetty
cgiservlet
command execution
security advisory
patch
version 9.4.52
version 10.0.16
version 11.0.16
version 12.0.0-beta2
cve-2023-36479

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.0%

Issue Overview:

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2. (CVE-2023-36479)

Affected Packages:

jetty

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update jetty to update your system.

New Packages:

noarch:  
    jetty-project-9.0.3-8.amzn2.0.2.noarch  
    jetty-annotations-9.0.3-8.amzn2.0.2.noarch  
    jetty-ant-9.0.3-8.amzn2.0.2.noarch  
    jetty-client-9.0.3-8.amzn2.0.2.noarch  
    jetty-continuation-9.0.3-8.amzn2.0.2.noarch  
    jetty-deploy-9.0.3-8.amzn2.0.2.noarch  
    jetty-http-9.0.3-8.amzn2.0.2.noarch  
    jetty-io-9.0.3-8.amzn2.0.2.noarch  
    jetty-jaas-9.0.3-8.amzn2.0.2.noarch  
    jetty-jaspi-9.0.3-8.amzn2.0.2.noarch  
    jetty-jmx-9.0.3-8.amzn2.0.2.noarch  
    jetty-jndi-9.0.3-8.amzn2.0.2.noarch  
    jetty-jsp-9.0.3-8.amzn2.0.2.noarch  
    jetty-jspc-maven-plugin-9.0.3-8.amzn2.0.2.noarch  
    jetty-maven-plugin-9.0.3-8.amzn2.0.2.noarch  
    jetty-monitor-9.0.3-8.amzn2.0.2.noarch  
    jetty-plus-9.0.3-8.amzn2.0.2.noarch  
    jetty-proxy-9.0.3-8.amzn2.0.2.noarch  
    jetty-rewrite-9.0.3-8.amzn2.0.2.noarch  
    jetty-runner-9.0.3-8.amzn2.0.2.noarch  
    jetty-security-9.0.3-8.amzn2.0.2.noarch  
    jetty-server-9.0.3-8.amzn2.0.2.noarch  
    jetty-servlet-9.0.3-8.amzn2.0.2.noarch  
    jetty-servlets-9.0.3-8.amzn2.0.2.noarch  
    jetty-start-9.0.3-8.amzn2.0.2.noarch  
    jetty-util-9.0.3-8.amzn2.0.2.noarch  
    jetty-util-ajax-9.0.3-8.amzn2.0.2.noarch  
    jetty-webapp-9.0.3-8.amzn2.0.2.noarch  
    jetty-xml-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-api-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-client-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-common-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-parent-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-server-9.0.3-8.amzn2.0.2.noarch  
    jetty-websocket-servlet-9.0.3-8.amzn2.0.2.noarch  
    jetty-javadoc-9.0.3-8.amzn2.0.2.noarch  
  
src:  
    jetty-9.0.3-8.amzn2.0.2.src  

Additional References

Red Hat: CVE-2023-36479

Mitre: CVE-2023-36479

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.0%