Bug 1192155 - (CVE-2017-7658) VUL-0: CVE-2017-7658: jetty-minimal: Incorrect header handling
(CVE-2017-7658)
VUL-0: CVE-2017-7658: jetty-minimal: Incorrect header handling
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/208919/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-10-29 09:48 UTC by Gabriele Sonnu
Modified: 2021-10-29 09:49 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2021-10-29 09:48:39 UTC
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Upstream issue:

https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1595621
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7658
https://www.oracle.com/security-alerts/cpuoct2020.html#CVE-2017-7658
https://www.oracle.com/security-alerts/cpujan2019.html#CVE-2017-7658
http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#CVE-2017-7658
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://access.redhat.com/security/cve/CVE-2017-7658
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7658.html
https://access.redhat.com/errata/RHSA-2020:3779
http://www.debian.org/security/-1/dsa-4278
https://access.redhat.com/errata/RHSA-2020:3779.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7658
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
http://www.securityfocus.com/bid/106566
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E
http://www.securitytracker.com/id/1041194
https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669
https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://www.debian.org/security/2018/dsa-4278
https://security.netapp.com/advisory/ntap-20181014-0001/
Comment 1 Gabriele Sonnu 2021-10-29 09:49:33 UTC
Not affecting us. Closing as INVALID.