Jetty Non-random Session ID Vulnerability

Medium Nessus Network Monitor Plugin ID 3904

Synopsis

The remote host is running an inherently insecure protocol or application.

Description

The remote host is running Jetty, a Java web server that can be downloaded from the Internet and is currently bundled with some IBM applications. This version of Jetty is vulnerable to a remote flaw within its random number generation. Jetty uses a predictable algorithm to generate session IDs. Given this, an attacker can gather and impersonate other accounts with generated session IDs. An attacker exploiting this flaw would only need to be able to access the Jetty application that utilized Session IDs.

Solution

Upgrade to version 4.2.27, 5.1.12, 6.0.2, 6.1.0-pre3 or higher.

See Also

http://fisheye.codehaus.org/changelog/jetty/?cs=1274

Plugin Details

Severity: Medium

ID: 3904

File Name: 3904.prm

Family: Web Servers

Published: 2007/02/06

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mortbay:jetty

Reference Information

CVE: CVE-2006-6969

BID: 22405