Lucene search

K
cve[email protected]CVE-2023-36479
HistorySep 15, 2023 - 7:15 p.m.

CVE-2023-36479

2023-09-1519:15:08
CWE-149
web.nvd.nist.gov
665
cve-2023-36479
eclipse jetty
canonical repository
cgiservlet
command execution
security patch

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

Affected configurations

Vulners
NVD
Node
eclipseeclipse_ideRange9.0.0–9.4.51
OR
eclipseeclipse_ideRange10.0.0–10.0.15
OR
eclipseeclipse_ideRange11.0.0–11.0.15
OR
eclipseeclipse_ideRange≤12.0.0-beta1
VendorProductVersionCPE
eclipseeclipse_ide*cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*
eclipseeclipse_ide*cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*
eclipseeclipse_ide*cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*
eclipseeclipse_ide*cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "eclipse",
    "product": "jetty.project",
    "versions": [
      {
        "version": ">= 9.0.0, <= 9.4.51",
        "status": "affected"
      },
      {
        "version": ">= 10.0.0, <= 10.0.15",
        "status": "affected"
      },
      {
        "version": ">= 11.0.0, <= 11.0.15",
        "status": "affected"
      },
      {
        "version": "<= 12.0.0-beta1",
        "status": "affected"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%