Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-36479
HistorySep 15, 2023 - 6:37 p.m.

CVE-2023-36479 Jetty vulnerable to errant command quoting in CGI Servlet

2023-09-1518:37:35
CWE-149
GitHub_M
www.cve.org
4
jetty
cgiservlet
command quoting
vulnerability
cve-2023-36479
runtime.exec
eclipse jetty canonical repository

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

23.0%

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

CNA Affected

[
  {
    "vendor": "eclipse",
    "product": "jetty.project",
    "versions": [
      {
        "version": ">= 9.0.0, <= 9.4.51",
        "status": "affected"
      },
      {
        "version": ">= 10.0.0, <= 10.0.15",
        "status": "affected"
      },
      {
        "version": ">= 11.0.0, <= 11.0.15",
        "status": "affected"
      },
      {
        "version": "<= 12.0.0-beta1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

23.0%