Jetty : Security Vulnerabilities, CVEs,
Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
Max CVSS
6.8
EPSS Score
28.56%
Published
2007-02-07
Updated
2018-10-16
jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations.
Max CVSS
5.0
EPSS Score
0.27%
Published
2006-06-02
Updated
2008-09-05
Directory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a %2e%2e%5c (encoded ../) in the URL. NOTE: this might be the same issue as CVE-2005-3747.
Max CVSS
5.0
EPSS Score
0.44%
Published
2006-06-02
Updated
2008-09-05
Unspecified vulnerability in Jetty HTTP Server, as used in (1) IBM Trading Partner Interchange before 4.2.4, (2) CA Unicenter Web Services Distributed Management (WSDM) before 3.11, and possibly other products, allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
Max CVSS
7.5
EPSS Score
2.27%
Published
2004-12-31
Updated
2018-10-19
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.
Max CVSS
5.0
EPSS Score
2.15%
Published
2004-12-31
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in Jetty JSP servlet engine allows remote attackers to insert arbitrary HTML or script via an HTTP request to a .jsp file whose name contains the malicious script and some encoded linefeed characters (%0a).
Max CVSS
5.8
EPSS Score
0.57%
Published
2003-03-31
Updated
2008-09-05
Directory traversal vulnerability in the CGIServlet for Jetty HTTP server before 4.1.0 allows remote attackers to execute arbitrary commands via ..\ (dot-dot backslash) sequences in an HTTP request to the cgi-bin directory.
Max CVSS
5.0
EPSS Score
1.62%
Published
2002-10-11
Updated
2016-10-18
7 vulnerabilities found