CVE-2024-6763
October 14, 2024
Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing.
The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI
differs from the common browsers in how it handles a URI that would be
considered invalid if fully validated against the RRC. Specifically HttpURI
and the browser may differ on the value of the host extracted from an
invalid URI and thus a combination of Jetty and a vulnerable browser may
be vulnerable to a open redirect attack or to a SSRF attack if the URI
is used after passing validation checks.
Affected Packages
org.eclipse.jetty:jetty-http (JAVA):
Affected version(s) >=12.0.0.alpha0 <12.0.12Fix Suggestion:
Update to version 12.0.12org.eclipse.jetty:jetty-http (JAVA):
Affected version(s) >=10.0.0 <10.0.25Fix Suggestion:
Update to version 10.0.25org.eclipse.jetty:jetty-http (JAVA):
Affected version(s) >=11.0.0 <11.0.25Fix Suggestion:
Update to version 11.0.25org.eclipse.jetty:jetty-server (JAVA):
Affected version(s) >=12.0.0.alpha0 <12.0.12Fix Suggestion:
Update to version 12.0.12org.eclipse.jetty:jetty-http (JAVA):
Affected version(s) >=7.0.0.v20091005 <9.4.57.v20241219Fix Suggestion:
Update to version 9.4.57.v20241219org.eclipse.jetty:jetty-server (JAVA):
Affected version(s) >=7.0.0.v20091005 <9.4.57.v20241219Fix Suggestion:
Update to version 9.4.57.v20241219Additional Notes
The description of this vulnerability differs from MITRE.
Related ResourcesĀ (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.7
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Validation of Syntactic Correctness of Input
EPSS
Base Score:
1.0