Skip to main content

Exposure of Sensitive Information to an Unauthorized Actor in org.eclipse.jetty.aggregate:jetty-all

CVE-2023-26049

  • org.eclipse.jetty.aggregate:jetty-all
  • org.eclipse.jetty.aggregate:jetty-all-server
  • org.eclipse.jetty.aggregate:jetty-plus
  • org.eclipse.jetty.aggregate:jetty-server
  • org.eclipse.jetty.aggregate:jetty-servlet
  • org.eclipse.jetty.aggregate:jetty-webapp
  • org.eclipse.jetty.ee8:jetty-ee8-nested
  • org.eclipse.jetty.ee9:jetty-ee9-nested
  • org.eclipse.jetty:jetty-http
  • org.eclipse.jetty:jetty-server
Severity Medium
Score 5.3/10

Summary

Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote `--` even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b;` `JSESSIONID=1337;` `c=d"` will be parsed as one cookie, with the name `DISPLAY_LANGUAGE` and a value of `b; JSESSIONID=1337;` `c=d` instead of 3 separate cookies. This has security implications because if, say, `JSESSIONID` is an HttpOnly cookie, and the `DISPLAY_LANGUAGE` cookie value is rendered on the page, an attacker can smuggle the `JSESSIONID` cookie into the `DISPLAY_LANGUAGE` cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This vulnerability affects versions prior to 9.4.51, 10.0.x prior to 10.0.14, 11.0.x prior to 11.0.14, and 12.0.x prior to 12.0.0.beta0.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-200 - Information Exposure

An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.

Advisory Timeline

  • Published