First published: Wed Jun 03 2020(Updated: )
Eclipse Jetty, as bundled in Jenkins, could allow a remote attacker to obtain sensitive information, caused by an issue with corrupt HTTP response buffer being sent to different clients. By sending a specially-crafted HTTP request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.235.5.1600415953-1.el7 | 0:2.235.5.1600415953-1.el7 |
redhat/jenkins | <0:2.235.5.1600415514-1.el7 | 0:2.235.5.1600415514-1.el7 |
redhat/jenkins | <0:2.235.5.1600414805-1.el7 | 0:2.235.5.1600414805-1.el7 |
Eclipse Jetty | =9.4.27-20200227 | |
Eclipse Jetty | =9.4.28-20200408 | |
Eclipse Jetty | =9.4.29-20200521 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-17638 is a vulnerability in Eclipse Jetty that could allow a remote attacker to obtain sensitive information.
The severity of CVE-2019-17638 is critical.
CVE-2019-17638 occurs when Jetty throws an exception due to too large response headers, causing the ByteBuffer containing the HTTP response headers to be released back to the ByteBufferPool twice, potentially leading to sensitive information exposure.
Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521 are affected by CVE-2019-17638.
To fix the CVE-2019-17638 vulnerability, update Eclipse Jetty to version 9.4.30 or higher.