Jetty 9.4.52,10.0.16,11.0.16,12.0.1: + CL Header Violation Smuggling Risk
CVE-2023-40167 Published on September 15, 2023

Jetty accepts "+" prefixed value in Content-Length
Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

Github Repository NVD

Vulnerability Analysis

CVE-2023-40167 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

What is a length manipulation Vulnerability?

The software parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. If an attacker can manipulate the length parameter associated with an input such that it is inconsistent with the actual length of the input, this can be leveraged to cause the target application to behave in unexpected, and possibly, malicious ways. One of the possible motives for doing so is to pass in arbitrarily large input to the application. Another possible motivation is the modification of application state by including invalid data for subsequent properties of the application. Such weaknesses commonly lead to attacks such as buffer overflows and execution of arbitrary code.

CVE-2023-40167 has been classified to as a length manipulation vulnerability or weakness.


Products Associated with CVE-2023-40167

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-40167 are published in these products:

 
 
 

Affected Versions

eclipse jetty.project:

Vulnerable Packages

The following package name and versions may be associated with CVE-2023-40167

Package Manager Vulnerable Package Versions Fixed In
maven org.eclipse.jetty:jetty-http = 12.0.0 12.0.1
maven org.eclipse.jetty:jetty-http >= 11.0.0, <= 11.0.15 11.0.16
maven org.eclipse.jetty:jetty-http >= 10.0.0, <= 10.0.15 10.0.16
maven org.eclipse.jetty:jetty-http >= 9.0.0, <= 9.4.51 9.4.52

Exploit Probability

EPSS
5.12%
Percentile
89.71%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.