Improper Handling of Length Parameter Inconsistency Affecting org.eclipse.jetty:jetty-http package, versions [9.0.0.M0,9.4.52.v20230823)[10.0.0,10.0.16)[11.0.0,11.0.16)[12.0.0,12.0.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGECLIPSEJETTY-5902998
  • published15 Sept 2023
  • disclosed14 Sept 2023
  • creditKeran Mu, Jianjun Chen

Introduced: 14 Sep 2023

CVE-2023-40167  (opens in a new tab)
CWE-130  (opens in a new tab)

How to fix?

Upgrade org.eclipse.jetty:jetty-http to version 9.4.52.v20230823, 10.0.16, 11.0.16, 12.0.1 or higher.

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Improper Handling of Length Parameter Inconsistency via the HttpParser.java component due to accepting the + character proceeding the content-length value in a HTTP/1 header field. An attacker can use jetty in combination with a server that does not close the connection after rejecting such request and after sending a 400 response. This could result in request smuggling.

PoC

 POST / HTTP/1.1
 Host: a.com
 Content-Length: +16
 Connection: close
 ​
 0123456789abcdef

CVSS Scores

version 3.1