First published: Fri Nov 27 2020(Updated: )
### Impact If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request on the same connection will see that body prepended to it's body. The attacker will not see any data, but may inject data into the body of the subsequent request CVE score is [4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&version=3.1) ### Workarounds The problem can be worked around by either: - Disabling compressed request body inflation by GzipHandler. - By always fully consuming the request content before sending a response. - By adding a `Connection: close` to any response where the servlet does not fully consume request content.
Credit: emo@eclipse.org emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.289.1.1624365627-1.el7 | 0:2.289.1.1624365627-1.el7 |
redhat/jenkins | <0:2.277.3.1623846768-1.el7 | 0:2.277.3.1623846768-1.el7 |
redhat/jenkins | <0:2.277.3.1623853726-1.el8 | 0:2.277.3.1623853726-1.el8 |
redhat/jetty | <9.4.35. | 9.4.35. |
redhat/jetty | <10.0.0. | 10.0.0. |
redhat/jetty | <11.0.0. | 11.0.0. |
maven/org.eclipse.jetty:jetty-server | >=9.4.0<=9.4.34 | 9.4.35.v20201120 |
Eclipse Jetty | >=9.4.0<9.4.35 | |
Eclipse Jetty | =10.0.0-alpha0 | |
Eclipse Jetty | =10.0.0-alpha1 | |
Eclipse Jetty | =10.0.0-beta0 | |
Eclipse Jetty | =10.0.0-beta1 | |
Eclipse Jetty | =10.0.0-beta2 | |
Eclipse Jetty | =11.0.0-alpha0 | |
Eclipse Jetty | =11.0.0-beta1 | |
Eclipse Jetty | =11.0.0-beta2 | |
NetApp OnCommand System Manager | >=3.0<=3.1.3 | |
NetApp Snap Creator Framework | ||
Oracle Blockchain Platform | <21.1.2 | |
Oracle Communications Converged Application Server - Service Controller | =6.2 | |
Oracle Communications Offline Mediation Controller | =12.0.0.3.0 | |
Oracle Communications Pricing Design Center | =12.0.0.3.0 | |
Oracle Communications Services Gatekeeper | =7.0 | |
Oracle Communications Session Route Manager | >=8.0.0<=8.2.4 | |
Oracle FLEXCUBE Private Banking | =12.0.0 | |
Oracle FLEXCUBE Private Banking | =12.1.0 | |
Oracle Hyperion Infrastructure Technology | =11.1.2.6.0 | |
Oracle REST Data Services | <20.4.3.050.1904 | |
Oracle Retail Eftlink | =20.0.0 | |
Oracle Siebel Core - Automation | <=21.5 | |
Apache Kafka | =2.7.0 | |
Apache Spark | =2.4.8 | |
Apache Spark | =3.0.3 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this Eclipse Jetty vulnerability is CVE-2020-27218.
CVE-2020-27218 has a severity level of medium (4.8).
Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2 are affected by this vulnerability.
An attacker can exploit CVE-2020-27218 by sending a request with a body that is larger than the content length.
Yes, upgrading to Eclipse Jetty version 9.4.35, 10.0.0 or 11.0.0 is recommended to remediate this vulnerability.