CVE-2017-7658 (CNNVD-201806-1241)

CRITICAL
中文标题:
Eclipse Jetty Server 环境问题漏洞
英文标题:
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4....
CVSS分数: 9.8
发布时间: 2018-06-26 17:00:00
漏洞类型: 环境问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Eclipse Jetty是Eclipse基金会的一个开源的、基于Java的Web服务器和Java Servlet容器。 Eclipse Jetty Server 9.2.x及之前版本、9.3.x版本和9.4.x版本中存在环境问题漏洞。攻击者可借助特制的请求利用该漏洞绕过授权。

英文描述:

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

CWE类型:
CWE-444
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
The Eclipse Foundation Eclipse Jetty - < 9.2.25 - cpe:2.3:a:the_eclipse_foundation:eclipse_jetty:*:*:*:*:*:*:*:*
eclipse jetty * - - cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
oracle rest_data_services 11.2.0.4 - - cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:*
oracle rest_data_services 12.1.0.2 - - cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:*
oracle rest_data_services 12.2.0.1 - - cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:*
oracle rest_data_services 18c - - cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:*
oracle retail_xstore_payment 3.3 - - cpe:2.3:a:oracle:retail_xstore_payment:3.3:*:*:*:*:*:*:*
oracle retail_xstore_point_of_service 7.1 - - cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
oracle retail_xstore_point_of_service 15.0 - - cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*
oracle retail_xstore_point_of_service 16.0 - - cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*
oracle retail_xstore_point_of_service 17.0 - - cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*
hp xp_p9000_command_view * - - cpe:2.3:a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:*
netapp e-series_santricity_management - - - cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:*:*:*
netapp e-series_santricity_os_controller * - - cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
netapp e-series_santricity_web_services - - - cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:*:*:*
netapp hci_management_node - - - cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
netapp hci_storage_node - - - cpe:2.3:a:netapp:hci_storage_node:-:*:*:*:*:*:*:*
netapp oncommand_system_manager * - - cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
netapp oncommand_unified_manager_for_7-mode - - - cpe:2.3:a:netapp:oncommand_unified_manager_for_7-mode:-:*:*:*:*:*:*:*
netapp santricity_cloud_connector - - - cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
netapp snap_creator_framework - - - cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
netapp snapcenter - - - cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
netapp snapmanager - - - cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
netapp solidfire - - - cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
netapp storage_services_connector - - - cpe:2.3:a:netapp:storage_services_connector:-:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
DSA-4278 vendor-advisory
cve.org
访问
1041194 vdb-entry
cve.org
访问
106566 vdb-entry
cve.org
访问
[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report mailing-list
cve.org
访问
[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar mailing-list
cve.org
访问
[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty mailing-list
cve.org
访问
[druid-commits] 20210304 [GitHub] [druid] suneet-s commented on issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty mailing-list
cve.org
访问
[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
9.8
CRITICAL
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本: 3.1
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2018-06-26 17:00:00
修改时间:
2024-08-05 16:12:27
创建时间:
2025-11-11 15:34:52
更新时间:
2025-11-11 15:53:46
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2017-7658 2025-11-11 15:19:32 2025-11-11 07:34:52
NVD nvd_CVE-2017-7658 2025-11-11 14:55:38 2025-11-11 07:43:29
CNNVD cnnvd_CNNVD-201806-1241 2025-11-11 15:10:02 2025-11-11 07:53:46
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:46
vulnerability_type: 未提取 → 环境问题; cnnvd_id: 未提取 → CNNVD-201806-1241; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 环境问题
  • cnnvd_id: 未提取 -> CNNVD-201806-1241
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:29
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.8; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 5 → 26; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 5 -> 26
  • data_sources: ['cve'] -> ['cve', 'nvd']