NA

CVE-2023-41900

Published: 15/09/2023 Updated: 21/01/2024
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Jetty is a Java based web server and servlet engine. Versions 9.4.21 up to and including 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

eclipse jetty

debian debian linux 11.0

debian debian linux 12.0

Vendor Advisories

Synopsis Critical: Red Hat Fuse 7121 release and security update Type/Severity Security Advisory: Critical Topic A minor version update (from 712 to 7121) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security has rated this update ...
Multiple security vulnerabilities were found in Jetty, a Java based web server and servlet engine The orgeclipsejettyservletsCGI class has been deprecated It is potentially unsafe to use it The upstream developers of Jetty recommend to use Fast CGI instead See also CVE-2023-36479 CVE-2023-26048 In affected versions servlets with multi ...