Vulnerability Name: CVE-2017-7658 (CCN-145522) Assigned: 2017-04-11 Published: 2018-06-25 Updated: 2021-07-20 Summary: In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N )5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-444 Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2017-7658 Source: CCN Type: Jetty Mailing List, Mon, 25 Jun 2018 12:17:08 -0400Jetty CVE Announcement - June 2018 Source: CCN Type: Eclipse Web siteEclipse Jetty Source: CCN Type: Oracle CPUJan2019Oracle Critical Patch Update Advisory - January 2019 Source: BID Type: Third Party Advisory, VDB Entry106566 Source: SECTRACK Type: Third Party Advisory, VDB Entry1041194 Source: CONFIRM Type: Third Party Advisoryhttps://bugs.eclipse.org/bugs/show_bug.cgi?id=535669 Source: XF Type: UNKNOWNeclipse-cve20177658-request-smuggling(145522) Source: MLIST Type: Mailing List, Third Party Advisory[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar Source: MLIST Type: Mailing List, Third Party Advisory[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report Source: MLIST Type: Mailing List, Third Party Advisory[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities Source: MLIST Type: Mailing List, Third Party Advisory[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image Source: MLIST Type: UNKNOWN[druid-commits] 20210304 [GitHub] [druid] suneet-s commented on issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty Source: MLIST Type: UNKNOWN[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty Source: MLIST Type: Mailing List, Third Party Advisory[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20181014-0001/ Source: CONFIRM Type: Third Party Advisoryhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us Source: DEBIAN Type: Third Party AdvisoryDSA-4278 Source: CCN Type: IBM Security Bulletin 0728823 (Sterling B2B Integrator)Multiple Security Vulnerabilities in Jetty Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 732816 (InfoSphere Information Server)Vulnerabilities in Eclipse Jetty affect the IBM InfoSphere Information Server installers Source: CCN Type: IBM Security Bulletin 733987 (Netcool Agile Service Manager)IBM Netcool Agile Service Manager is affected by Eclipse Jetty vulnerabilities Source: CCN Type: IBM Security Bulletin 0792111 (Sterling Secure Proxy)Multiple Vulnerabilities affect IBM Sterling Secure Proxy Source: CCN Type: IBM Security Bulletin 792117 (Sterling Secure Proxy)Multiple Vulnerabilities affect IBM Sterling External Authentication Server Source: CCN Type: IBM Security Bulletin 794721 (UrbanCode Deploy)Publicly Disclosed Vulnerability Found By vFinder (CVE-2017-7656, CVE-2017-7657, CVE-2017-7658, CVE-2018-12536) Source: CCN Type: IBM Security Bulletin 6202751 (eDiscovery Analyzer)Publicly disclosed vulnerability found by vFinder in IBM eDiscovery Analyzer Source: CCN Type: IBM Security Bulletin 6320063 (Security Guardium Insights)IBM Security Guardium Insights is affected by a Components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption)Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE) Source: CCN Type: IBM Security Bulletin 6344071 (QRadar SIEM)IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6466729 (Cognos Analytics)IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6602025 (Tivoli Netcool/OMNIbus)Tivoli Netcool/Omnibus installation contains vulnerable Eclipse Jetty code libraries (Multiple CVEs) Source: CCN Type: IBM Security Bulletin 6621343 (Control Desk)Provision to add https and Secure Flag to bayeux_browser cookie for IBM Control Desk. Source: CCN Type: IBM Security Bulletin 6854577 (Security Verify Governance)IBM Security Verify Governance is vulnerable to multiple vulnerabilities due to Eclipse Jetty Source: CCN Type: IBM Security Bulletin 6983274 (Cognos Command Center)IBM Cognos Command Center is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 7005945 (Storage Protect)IBM Storage Protect Server is vulnerable to various attacks due to Eclipse jetty Source: CCN Type: Oracle CPUOct2020Oracle Critical Patch Update Advisory - October 2020 Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2020.html Source: CONFIRM Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2017-7658 Vulnerable Configuration: Configuration 1 :cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version >= 9.4.0 and < 9.4.11)OR cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version >= 9.3.0 and < 9.3.24) OR cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version <= 9.2.26) Configuration 2 :cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* Configuration 3 :cpe:/a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:* OR cpe:/a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:* OR cpe:/a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:* OR cpe:/a:oracle:rest_data_services:18c:*:*:*:-:*:*:* OR cpe:/a:oracle:retail_xstore_payment:3.3:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:* (Version >= 8.4.0-00 and <= 8.6.2-00)AND cpe:/h:hp:xp_p9000:-:*:*:*:*:*:*:* Configuration 5 :cpe:/a:netapp:e-series_santricity_management:-:*:*:*:*:*:*:* OR cpe:/a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* (Version >= 11.0 and <= 11.50.1) OR cpe:/a:netapp:e-series_santricity_web_services:-:*:*:*:*:*:*:* OR cpe:/a:netapp:hci_management_node:-:*:*:*:*:*:*:* OR cpe:/a:netapp:hci_storage_node:-:*:*:*:*:*:*:* OR cpe:/a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* (Version >= 3.0 and <= 3.1.3) OR cpe:/a:netapp:oncommand_unified_manager_for_7-mode:-:*:*:*:*:*:*:* OR cpe:/a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:* OR cpe:/a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* OR cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:* OR cpe:/a:netapp:snapmanager:-:*:*:*:*:oracle:*:* OR cpe:/a:netapp:snapmanager:-:*:*:*:*:sap:*:* OR cpe:/a:netapp:solidfire:-:*:*:*:*:*:*:* OR cpe:/a:netapp:storage_services_connector:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:eclipse:jetty:9.4.0:20180619:*:*:*:*:*:* OR cpe:/a:eclipse:jetty:9.2.0:20140526:*:*:*:*:*:* OR cpe:/a:eclipse:jetty:9.3.0:20150612:*:*:*:*:*:* AND cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:-:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_netcool/omnibus:8.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_secure_proxy:3.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_secure_proxy:3.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.5.1:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.3.8:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.6.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:netcool_agile_service_manager:1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:netcool_agile_service_manager:1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.5.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_command_center:10.2.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:p4:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.1:-:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* OR cpe:/a:ibm:control_desk:7.6.1:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
eclipse jetty *
eclipse jetty *
eclipse jetty *
debian debian linux 9.0
oracle rest data services 11.2.0.4
oracle rest data services 12.1.0.2
oracle rest data services 12.2.0.1
oracle rest data services 18c
oracle retail xstore payment 3.3
oracle retail xstore point of service 7.1
oracle retail xstore point of service 15.0
oracle retail xstore point of service 16.0
oracle retail xstore point of service 17.0
hp xp p9000 command view *
hp xp p9000 -
netapp e-series santricity management -
netapp e-series santricity os controller *
netapp e-series santricity web services -
netapp hci management node -
netapp hci storage node -
netapp oncommand system manager *
netapp oncommand unified manager for 7-mode -
netapp santricity cloud connector -
netapp snap creator framework -
netapp snapcenter -
netapp snapmanager -
netapp snapmanager -
netapp solidfire -
netapp storage services connector -
eclipse jetty 9.4.0 20180619
eclipse jetty 9.2.0 20140526
eclipse jetty 9.3.0 20150612
ibm infosphere information server 9.1
ibm sterling b2b integrator -
ibm urbancode deploy 6.1.0.2
ibm infosphere information server 11.3
ibm tivoli netcool/omnibus 8.1.0
ibm urbancode deploy 6.1
ibm urbancode deploy 6.1.0.1
ibm urbancode deploy 6.1.0.3
ibm sterling secure proxy 3.4.2
ibm urbancode deploy 6.1.0.4
ibm urbancode deploy 6.1.1
ibm urbancode deploy 6.1.1.1
ibm urbancode deploy 6.1.1.2
ibm urbancode deploy 6.1.1.3
ibm urbancode deploy 6.1.1.4
ibm urbancode deploy 6.1.1.5
ibm urbancode deploy 6.1.1.6
ibm urbancode deploy 6.1.1.7
ibm urbancode deploy 6.1.2
ibm infosphere information server 11.5
ibm urbancode deploy 6.1.1.8
ibm urbancode deploy 6.1.3
ibm urbancode deploy 6.1.3.1
ibm urbancode deploy 6.2
ibm urbancode deploy 6.2.0.1
ibm urbancode deploy 6.1.3.2
ibm urbancode deploy 6.2.0.2
ibm urbancode deploy 6.2.1
ibm sterling secure proxy 3.4.3
ibm urbancode deploy 6.2.1.1
ibm urbancode deploy 6.1.3.3
ibm urbancode deploy 6.2.1.2
ibm urbancode deploy 6.2.2
ibm cognos analytics 11.0
ibm urbancode deploy 6.2.2.1
ibm urbancode deploy 6.2.3.0
ibm urbancode deploy 6.2.3.1
ibm urbancode deploy 6.1.3.4
ibm urbancode deploy 6.1.3.5
ibm urbancode deploy 6.2.4
ibm urbancode deploy 6.1.3.6
ibm urbancode deploy 6.2.4.1
ibm urbancode deploy 6.2.4.2
ibm urbancode deploy 6.2.5.1
ibm infosphere information server 11.7
ibm urbancode deploy 6.1.3.7
ibm urbancode deploy 6.1.3.8
ibm urbancode deploy 6.2.6.0
ibm urbancode deploy 6.2.6.1
ibm urbancode deploy 6.2.7.0
ibm sterling b2b integrator 5.2.0.1
ibm sterling b2b integrator 5.2.6.3
ibm urbancode deploy 6.2.7.1
ibm urbancode deploy 6.2.7.2
ibm netcool agile service manager 1.1.1
ibm netcool agile service manager 1.1.2
ibm qradar security information and event manager 7.3.0
ibm urbancode deploy 6.2.5.0
ibm urbancode deploy 6.2.7.3
ibm urbancode deploy 7.0.0.0
ibm urbancode deploy 7.0.0.1
ibm urbancode deploy 7.0.1.0
ibm urbancode deploy 7.0.1.1
ibm cognos command center 10.2.4.1
ibm cognos analytics 11.1
ibm security guardium insights 2.0.1
ibm security guardium data encryption 3.0.0.2
ibm qradar security information and event manager 7.3.3 p4
ibm qradar security information and event manager 7.4.0
ibm qradar security information and event manager 7.4.1 -
ibm security verify governance 10.0
ibm control desk 7.6.1