Improper input validation in Mort Bay Jetty
High severity
GitHub Reviewed
Published
May 2, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Package
Affected versions
>= 6.0.0, < 6.1.23
>= 7.0.0, < 7.0.2
Patched versions
6.1.23
7.0.2
Description
Published by the National Vulnerability Database
Jan 13, 2010
Published to the GitHub Advisory Database
May 2, 2022
Reviewed
Jun 10, 2022
Last updated
Jan 27, 2023
Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.
References