Mort Bay Jetty 6.x up to and including 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote malicious users to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mortbay jetty 6.1.15 |
||
mortbay jetty 6.1.12 |
||
mortbay jetty 6.1.7 |
||
mortbay jetty 6.1.6 |
||
mortbay jetty 6.1.4 |
||
mortbay jetty 6.1.2 |
||
mortbay jetty 6.1.0 |
||
mortbay jetty 6.0.0 |
||
mortbay jetty 6.1.16 |
||
mortbay jetty 6.1.11 |
||
mortbay jetty 6.1.8 |
||
mortbay jetty 6.1.20 |
||
mortbay jetty 6.1.1 |
||
mortbay jetty 6.0.1 |
||
mortbay jetty 6.1.3 |
||
mortbay jetty 6.1.19 |
||
mortbay jetty 6.1.14 |
||
mortbay jetty 6.1.9 |
||
mortbay jetty 6.1.10 |
||
mortbay jetty 6.1.5 |
||
mortbay jetty 6.0.2 |
||
mortbay jetty 7.0.0 |