Lucene search

K
redosRedosROS-20240730-08
HistoryJul 30, 2024 - 12:00 a.m.

ROS-20240730-08

2024-07-3000:00:00
redos.red-soft.ru
8
eclipse jetty
servlet container
vulnerability
input data length parameters
exploitation
remote attack
http request smuggling
arbitrary code execution
unix

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

30.2%

Eclipse Jetty servlet container vulnerability is related to errors in processing input data length parameters.
data length parameters. Exploitation of the vulnerability could allow an attacker acting remotely to perform a
“HTTP request smuggling” attack

The Eclipse Jetty servlet container vulnerability is related to the generation of a command line containing
multiple tokens instead of a single token. Exploitation of the vulnerability could allow an attacker to execute arbitrary code.
arbitrary code

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64jetty< 9.4.54-1UNKNOWN

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

30.2%