First published: Wed Jan 13 2010(Updated: )
The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Jetty | =6.0.0 | |
Eclipse Jetty | =6.0.0-alpha0 | |
Eclipse Jetty | =6.0.0-alpha1 | |
Eclipse Jetty | =6.0.0-alpha2 | |
Eclipse Jetty | =6.0.0-alpha3 | |
Eclipse Jetty | =6.0.0-beta0 | |
Eclipse Jetty | =6.0.0-beta1 | |
Eclipse Jetty | =6.0.0-beta10 | |
Eclipse Jetty | =6.0.0-beta11 | |
Eclipse Jetty | =6.0.0-beta12 | |
Eclipse Jetty | =6.0.0-beta14 | |
Eclipse Jetty | =6.0.0-beta15 | |
Eclipse Jetty | =6.0.0-beta16 | |
Eclipse Jetty | =6.0.0-beta17 | |
Eclipse Jetty | =6.0.0-beta2 | |
Eclipse Jetty | =6.0.0-beta3 | |
Eclipse Jetty | =6.0.0-beta4 | |
Eclipse Jetty | =6.0.0-beta5 | |
Eclipse Jetty | =6.0.0-beta6 | |
Eclipse Jetty | =6.0.0-beta7 | |
Eclipse Jetty | =6.0.0-beta8 | |
Eclipse Jetty | =6.0.0-beta9 | |
Eclipse Jetty | =6.0.0-betax | |
Eclipse Jetty | =6.0.0-rc0 | |
Eclipse Jetty | =6.0.0-rc1 | |
Eclipse Jetty | =6.0.0-rc2 | |
Eclipse Jetty | =6.0.0-rc3 | |
Eclipse Jetty | =6.0.0-rc4 | |
Eclipse Jetty | =6.0.1 | |
Eclipse Jetty | =6.0.2 | |
Eclipse Jetty | =6.1.0 | |
Eclipse Jetty | =6.1.0-pre0 | |
Eclipse Jetty | =6.1.0-pre1 | |
Eclipse Jetty | =6.1.0-pre2 | |
Eclipse Jetty | =6.1.0-pre3 | |
Eclipse Jetty | =6.1.0-rc0 | |
Eclipse Jetty | =6.1.0-rc1 | |
Eclipse Jetty | =6.1.0-rc2 | |
Eclipse Jetty | =6.1.0-rc3 | |
Eclipse Jetty | =6.1.1 | |
Eclipse Jetty | =6.1.1-rc0 | |
Eclipse Jetty | =6.1.2 | |
Eclipse Jetty | =6.1.2-pre0 | |
Eclipse Jetty | =6.1.2-pre1 | |
Eclipse Jetty | =6.1.2-rc0 | |
Eclipse Jetty | =6.1.2-rc1 | |
Eclipse Jetty | =6.1.2-rc2 | |
Eclipse Jetty | =6.1.2-rc3 | |
Eclipse Jetty | =6.1.2-rc4 | |
Eclipse Jetty | =6.1.2-rc5 | |
Eclipse Jetty | =6.1.3 | |
Eclipse Jetty | =6.1.4 | |
Eclipse Jetty | =6.1.4-rc0 | |
Eclipse Jetty | =6.1.4-rc1 | |
Eclipse Jetty | =6.1.5 | |
Eclipse Jetty | =6.1.5-rc0 | |
Eclipse Jetty | =6.1.6 | |
Eclipse Jetty | =6.1.6-rc0 | |
Eclipse Jetty | =6.1.6-rc1 | |
Eclipse Jetty | =6.1.7 | |
Eclipse Jetty | =6.1.8 | |
Eclipse Jetty | =6.1.9 | |
Eclipse Jetty | =6.1.10 | |
Eclipse Jetty | =6.1.11 | |
Eclipse Jetty | =6.1.12 | |
Eclipse Jetty | =6.1.12-rc1 | |
Eclipse Jetty | =6.1.12-rc2 | |
Eclipse Jetty | =6.1.12-rc3 | |
Eclipse Jetty | =6.1.12-rc4 | |
Eclipse Jetty | =6.1.12-rc5 | |
Eclipse Jetty | =6.1.14 | |
Eclipse Jetty | =6.1.15 | |
Eclipse Jetty | =6.1.15-pre0 | |
Eclipse Jetty | =6.1.15-rc2 | |
Eclipse Jetty | =6.1.15-rc3 | |
Eclipse Jetty | =6.1.15-rc4 | |
Eclipse Jetty | =6.1.15-rc5 | |
Eclipse Jetty | =6.1.16 | |
Eclipse Jetty | =6.1.19 | |
Eclipse Jetty | =6.1.20 | |
Eclipse Jetty | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4609 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To mitigate CVE-2009-4609, it's recommended to disable the Dump Servlet or upgrade to a patched version of Jetty.
CVE-2009-4609 affects Mort Bay Jetty versions 6.x and 7.0.0.
CVE-2009-4609 can expose sensitive information such as internal variables, including the getPathTranslated variable.
Yes, a workaround for CVE-2009-4609 includes implementing access controls to restrict requests to the /dump/ URI.