Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Jetty Non-random Session ID Vulnerability



The remote host is running an inherently insecure protocol or application.


The remote host is running Jetty, a Java web server that can be downloaded from the Internet and is currently bundled with some IBM applications. This version of Jetty is vulnerable to a remote flaw within its random number generation. Jetty uses a predictable algorithm to generate session IDs. Given this, an attacker can gather and impersonate other accounts with generated session IDs. An attacker exploiting this flaw would only need to be able to access the Jetty application that utilized Session IDs.


Upgrade to version 4.2.27, 5.1.12, 6.0.2, 6.1.0-pre3 or higher.