Jetty HttpParser Error Remote Memory Disclosure

high Nessus Plugin ID 81576

Synopsis

The remote web server is affected by a remote memory disclosure vulnerability.

Description

The remote instance of Jetty is affected by a remote memory disclosure vulnerability in the HttpParser module due to incorrect handling of illegal characters in header values. When an illegal character is encountered in an HTTP request, Jetty writes a response in a shared buffer that was used in a previous request. Jetty's response to the client includes this shared buffer which contains potentially sensitive data from the previous request. An attacker, using specially crafted requests containing variable length strings of illegal characters, can steal sensitive header data (e.g. cookies, authentication tokens) or sensitive POST data (e.g. credentials).

Solution

Upgrade to Jetty 9.2.9.v20150224 or later. For Jetty 9.3.x, contact the vendor for a solution.

See Also

http://www.nessus.org/u?b8e07913

https://bugs.eclipse.org/bugs/show_bug.cgi?id=460642

http://www.nessus.org/u?f918c477

Plugin Details

Severity: High

ID: 81576

File Name: jetty_cve-2015-2080.nasl

Version: 1.7

Type: remote

Family: Web Servers

Published: 2/27/2015

Updated: 11/26/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-2080

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mortbay:jetty

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/24/2015

Vulnerability Publication Date: 2/24/2015

Reference Information

CVE: CVE-2015-2080

BID: 72768