Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/42496 - | |
References | () http://secunia.com/advisories/27925 - | |
References | () http://secunia.com/advisories/30941 - | |
References | () http://secunia.com/advisories/35143 - | |
References | () http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt - | |
References | () http://www.kb.cert.org/vuls/id/438616 - Patch, US Government Resource | |
References | () http://www.securityfocus.com/bid/26695 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html - |
Information
Published : 2007-12-05 11:46
Updated : 2024-11-21 00:38
NVD link : CVE-2007-5614
Mitre link : CVE-2007-5614
CVE.ORG link : CVE-2007-5614
JSON object : View
Products Affected
mortbay_jetty
- jetty
CWE