FreeBSD : jetty -- multiple vulnerabilities (6ae7cef2-a6ae-11dc-95e6-000c29c5647f)

High Nessus Plugin ID 29288


The remote FreeBSD host is missing a security-related update.


Cross-site scripting (XSS) vulnerability in Dump Servlet in Mortbay Jetty before 6.1.6rc1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters and cookies.

Mortbay Jetty before 6.1.6rc1 does not properly handle 'certain quote sequences' in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.

CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 29288

File Name: freebsd_pkg_6ae7cef2a6ae11dc95e6000c29c5647f.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2007/12/11

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jetty, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2007/12/10

Vulnerability Publication Date: 2007/12/05

Reference Information

CVE: CVE-2007-5613, CVE-2007-5614, CVE-2007-5615

CERT: 212984, 237888, 438616

CWE: 79, 94