First published: Fri Oct 07 2016(Updated: )
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =22 | |
Mortbay Jetty | =9.2.3 | |
Mortbay Jetty | =9.2.4 | |
Mortbay Jetty | =9.2.5 | |
Mortbay Jetty | =9.2.6 | |
Mortbay Jetty | =9.2.7 | |
Mortbay Jetty | =9.2.8 | |
Mortbay Jetty | =9.3.0-m0 | |
Mortbay Jetty | =9.3.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2080 is classified as a medium severity vulnerability due to the potential for information disclosure.
To fix CVE-2015-2080, update Eclipse Jetty to version 9.2.9 or later.
CVE-2015-2080 affects multiple versions of Eclipse Jetty and certain versions of Fedora operating systems.
The impact of CVE-2015-2080 includes the risk of unauthorized access to sensitive information from process memory.
Yes, CVE-2015-2080 can be exploited remotely through crafted HTTP headers.