Improper Validation of Syntactic Correctness of Input Affecting org.eclipse.jetty:jetty-http package, versions [,12.0.12)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGECLIPSEJETTY-8186141
- published 15 Oct 2024
- disclosed 14 Oct 2024
- credit z3r0yu
Introduced: 14 Oct 2024
CVE-2024-6763 Open this link in a new tabHow to fix?
Upgrade org.eclipse.jetty:jetty-http
to version 12.0.12 or higher.
Overview
org.eclipse.jetty:jetty-http is an is a http module for jetty server.
Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input via the HttpURI
class due to insufficient validation on the authority segment of a URI. An attacker can manipulate the URI parsing to redirect requests or initiate server-side requests to unintended destinations by supplying malformed URIs that bypass validation checks.
Notes:
This is only exploitable if the application uses decoded user data as encoded URIs in conjunction with the
HttpURI
class used directly;The Jetty usage of the
HttpURI
class is not vulnerable.
Workaround
This vulnerability can be mitigated by not passing decoded user data as encoded URIs to any URI class/method, including HttpURI
.
PoC
http://browser.check &@vulndetector.com/
http://browser.check #@vulndetector.com/
http://browser.check?@vulndetector.com/
http://browser.check#@vulndetector.com/
http://vulndetector.com\\/