First published: Tue Apr 18 2023(Updated: )
Eclipse Jetty could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw during nonstandard cookie parsing. By sending a specially crafted request to tamper with the cookie parsing mechanism, an attacker could exploit this vulnerability to obtain values from other cookies, and use this information to launch further attacks against the affected system.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.eclipse.jetty:jetty-server | <9.4.51.v20230217 | 9.4.51.v20230217 |
maven/org.eclipse.jetty:jetty-server | >=12.0.0alpha0<12.0.0.beta0 | 12.0.0.beta0 |
maven/org.eclipse.jetty:jetty-server | >=11.0.0<11.0.14 | 11.0.14 |
maven/org.eclipse.jetty:jetty-server | >=10.0.0<10.0.14 | 10.0.14 |
Eclipse Jetty | <9.4.51 | |
Eclipse Jetty | >=10.0.0<10.0.14 | |
Eclipse Jetty | >=11.0.0<11.0.14 | |
Eclipse Jetty | =12.0.0-alpha1 | |
Eclipse Jetty | =12.0.0-alpha2 | |
Eclipse Jetty | =12.0.0-alpha3 | |
debian/jetty9 | <=9.4.16-0+deb10u1 | 9.4.50-4+deb10u1 9.4.39-3+deb11u2 9.4.50-4+deb11u1 9.4.50-4+deb12u2 9.4.53-1 |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp E-Series SANtricity OS Controller | >=11.0 | |
Netapp E-series Santricity Unified Manager | ||
Netapp E-series Santricity Web Services | ||
redhat/jetty-server | <9.4.51 | 9.4.51 |
redhat/jetty-server | <10.0.14 | 10.0.14 |
redhat/jetty-server | <11.0.14 | 11.0.14 |
redhat/jetty-server | <12.0.0. | 12.0.0. |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26049 is a vulnerability in Eclipse Jetty that could allow a remote authenticated attacker to obtain sensitive information by tampering with the cookie parsing mechanism.
CVE-2023-26049 impacts Jetty by allowing an attacker to smuggle cookies within other cookies or perform unintended behavior by tampering with the cookie parsing mechanism.
Jetty versions 9.4.51, 9.4.51.v20230217, 10.0.14, 11.0.14, and 12.0.0.beta0 are affected by CVE-2023-26049.
CVE-2023-26049 has a severity rating of 4.5 (medium).
To fix CVE-2023-26049, update Jetty to version 9.4.51, 9.4.51.v20230217, 10.0.14, 11.0.14, or 12.0.0.beta0.