Skip to content

Update dependency org.eclipse.jetty:jetty-server to v9.4.57.v20241219 [SECURITY]#30

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/maven-org.eclipse.jetty-jetty-server-vulnerability
Open

Update dependency org.eclipse.jetty:jetty-server to v9.4.57.v20241219 [SECURITY]#30
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/maven-org.eclipse.jetty-jetty-server-vulnerability

Conversation

@renovate
Copy link

@renovate renovate bot commented Jun 13, 2023

This PR contains the following updates:

Package Change Age Confidence
org.eclipse.jetty:jetty-server (source) 9.4.41.v202105169.4.57.v20241219 age confidence

GitHub Vulnerability Alerts

CVE-2023-26048

Impact

Servlets with multipart support (e.g. annotated with @MultipartConfig) that call HttpServletRequest.getParameter() or HttpServletRequest.getParts() may cause OutOfMemoryError when the client sends a multipart request with a part that has a name but no filename and a very large content.

This happens even with the default settings of fileSizeThreshold=0 which should stream the whole part content to disk.

An attacker client may send a large multipart request and cause the server to throw OutOfMemoryError.
However, the server may be able to recover after the OutOfMemoryError and continue its service -- although it may take some time.

A very large number of parts may cause the same problem.

Patches

Patched in Jetty versions

  • 9.4.51.v20230217 - via PR #​9345
  • 10.0.14 - via PR #​9344
  • 11.0.14 - via PR #​9344

Workarounds

Multipart parameter maxRequestSize must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
Limiting multipart parameter maxFileSize won't be enough because an attacker can send a large number of parts that summed up will cause memory issues.

References

CVE-2023-26049

Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism.

If Jetty sees a cookie VALUE that starts with " (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered.

So, a cookie header such as:

DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d" will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d

instead of 3 separate cookies.

Impact

This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server.

Patches

  • 9.4.51.v20230217 - via PR #​9352
  • 10.0.15 - via PR #​9339
  • 11.0.15 - via PR #​9339

Workarounds

No workarounds

References

CVE-2024-8184

Impact

Remote DOS attack can cause out of memory

Description

There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which
can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By
repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the
server's memory.

Affected Versions

  • Jetty 12.0.0-12.0.8 (Supported)
  • Jetty 11.0.0-11.0.23 (EOL)
  • Jetty 10.0.0-10.0.23 (EOL)
  • Jetty 9.3.12-9.4.55 (EOL)

Patched Versions

  • Jetty 12.0.9
  • Jetty 11.0.24
  • Jetty 10.0.24
  • Jetty 9.4.56

Workarounds

Do not use ThreadLimitHandler.
Consider use of QoSHandler instead to artificially limit resource utilization.

References

Jetty 12 - https://github.com/jetty/jetty.project/pull/11723

CVE-2024-13009

In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request body. This can result in corrupted and/or inadvertent sharing of data between requests.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/maven-org.eclipse.jetty-jetty-server-vulnerability branch from 496d08a to ad98018 Compare October 15, 2024 02:26
@renovate renovate bot changed the title Update dependency org.eclipse.jetty:jetty-server to v9.4.51.v20230217 [SECURITY] Update dependency org.eclipse.jetty:jetty-server to v9.4.56.v20240826 [SECURITY] Oct 15, 2024
@renovate renovate bot force-pushed the renovate/maven-org.eclipse.jetty-jetty-server-vulnerability branch from ad98018 to db17248 Compare May 9, 2025 23:59
@renovate renovate bot changed the title Update dependency org.eclipse.jetty:jetty-server to v9.4.56.v20240826 [SECURITY] Update dependency org.eclipse.jetty:jetty-server to v9.4.57.v20241219 [SECURITY] May 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants