Lucene search

K
nvd[email protected]NVD:CVE-2023-36479
HistorySep 15, 2023 - 7:15 p.m.

CVE-2023-36479

2023-09-1519:15:08
CWE-149
web.nvd.nist.gov
1
eclipse jetty
cgiservlet
vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.1%

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

Affected configurations

NVD
Node
eclipsejettyRange9.0.09.4.52
OR
eclipsejettyRange10.0.010.0.16
OR
eclipsejettyRange11.0.011.0.16
OR
eclipsejettyMatch12.0.0alpha1
OR
eclipsejettyMatch12.0.0alpha2
OR
eclipsejettyMatch12.0.0alpha3
OR
eclipsejettyMatch12.0.0beta0
OR
eclipsejettyMatch12.0.0beta1
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
OR
debiandebian_linuxMatch12.0

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.1%