The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html - Vendor Advisory | |
References | () http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html - Vendor Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html - Exploit, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2015/Mar/12 - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/534755/100/1600/threaded - | |
References | () http://www.securityfocus.com/bid/72768 - Broken Link | |
References | () http://www.securitytracker.com/id/1031800 - Third Party Advisory | |
References | () https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html - Exploit, Third Party Advisory | |
References | () https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md - Exploit, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190307-0005/ - |
Information
Published : 2016-10-07 14:59
Updated : 2024-11-21 02:26
NVD link : CVE-2015-2080
Mitre link : CVE-2015-2080
CVE.ORG link : CVE-2015-2080
JSON object : View
Products Affected
eclipse
- jetty
fedoraproject
- fedora
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor