eclipse jetty CVE-2017-7657 vulnerability in Eclipse and Other Products
Published on June 26, 2018

product logo product logo product logo product logo
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a HTTP Request Smuggling Vulnerability?

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.

CVE-2017-7657 has been classified to as a HTTP Request Smuggling vulnerability or weakness.


Products Associated with CVE-2017-7657

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2017-7657 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

The Eclipse Foundation Eclipse Jetty:

Exploit Probability

EPSS
9.10%
Percentile
92.50%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.