SUSE update for jetty-minimal



| Updated: 2024-12-06
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2023-36478
CVE-2023-36479
CVE-2023-40167
CVE-2023-41900
CVE-2023-44487
CWE-ID CWE-190
CWE-20
CWE-444
CWE-285
CWE-400
Exploitation vector Network
Public exploit Vulnerability #5 is being exploited in the wild.
Vulnerable software
Development Tools Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP3 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP2 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing LTSS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing ESPOS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Enterprise Storage
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

jetty-jaas
Operating systems & Components / Operating system package or component

jetty-client
Operating systems & Components / Operating system package or component

jetty-deploy
Operating systems & Components / Operating system package or component

jetty-jsp
Operating systems & Components / Operating system package or component

jetty-jmx
Operating systems & Components / Operating system package or component

jetty-xml
Operating systems & Components / Operating system package or component

jetty-http-spi
Operating systems & Components / Operating system package or component

jetty-plus
Operating systems & Components / Operating system package or component

jetty-minimal-javadoc
Operating systems & Components / Operating system package or component

jetty-jndi
Operating systems & Components / Operating system package or component

jetty-annotations
Operating systems & Components / Operating system package or component

jetty-quickstart
Operating systems & Components / Operating system package or component

jetty-continuation
Operating systems & Components / Operating system package or component

jetty-proxy
Operating systems & Components / Operating system package or component

jetty-webapp
Operating systems & Components / Operating system package or component

jetty-fcgi
Operating systems & Components / Operating system package or component

jetty-start
Operating systems & Components / Operating system package or component

jetty-openid
Operating systems & Components / Operating system package or component

jetty-ant
Operating systems & Components / Operating system package or component

jetty-rewrite
Operating systems & Components / Operating system package or component

jetty-servlets
Operating systems & Components / Operating system package or component

jetty-cdi
Operating systems & Components / Operating system package or component

jetty-util-ajax
Operating systems & Components / Operating system package or component

jetty-io
Operating systems & Components / Operating system package or component

jetty-security
Operating systems & Components / Operating system package or component

jetty-servlet
Operating systems & Components / Operating system package or component

jetty-http
Operating systems & Components / Operating system package or component

jetty-util
Operating systems & Components / Operating system package or component

jetty-server
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU81726

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-36478

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in MetaDataBuilder.checkSize when handling HTTP/2 HPACK header values. A remote attacker can send specially crafted request to the server, trigger an integer overflow and crash the server.

Mitigation

Update the affected package jetty-minimal to the latest version.

Vulnerable software versions

Development Tools Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP5

SUSE Linux Enterprise Server 15: SP2 - SP5

SUSE Linux Enterprise Real Time 15: SP4 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

openSUSE Leap: 15.4 - 15.5

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.3

SUSE Manager Server: 4.3

SUSE Manager Proxy: 4.3

jetty-jaas: before 9.4.53-150200.3.22.1

jetty-client: before 9.4.53-150200.3.22.1

jetty-deploy: before 9.4.53-150200.3.22.1

jetty-jsp: before 9.4.53-150200.3.22.1

jetty-jmx: before 9.4.53-150200.3.22.1

jetty-xml: before 9.4.53-150200.3.22.1

jetty-http-spi: before 9.4.53-150200.3.22.1

jetty-plus: before 9.4.53-150200.3.22.1

jetty-minimal-javadoc: before 9.4.53-150200.3.22.1

jetty-jndi: before 9.4.53-150200.3.22.1

jetty-annotations: before 9.4.53-150200.3.22.1

jetty-quickstart: before 9.4.53-150200.3.22.1

jetty-continuation: before 9.4.53-150200.3.22.1

jetty-proxy: before 9.4.53-150200.3.22.1

jetty-webapp: before 9.4.53-150200.3.22.1

jetty-fcgi: before 9.4.53-150200.3.22.1

jetty-start: before 9.4.53-150200.3.22.1

jetty-openid: before 9.4.53-150200.3.22.1

jetty-ant: before 9.4.53-150200.3.22.1

jetty-rewrite: before 9.4.53-150200.3.22.1

jetty-servlets: before 9.4.53-150200.3.22.1

jetty-cdi: before 9.4.53-150200.3.22.1

jetty-util-ajax: before 9.4.53-150200.3.22.1

jetty-io: before 9.4.53-150200.3.22.1

jetty-security: before 9.4.53-150200.3.22.1

jetty-servlet: before 9.4.53-150200.3.22.1

jetty-http: before 9.4.53-150200.3.22.1

jetty-util: before 9.4.53-150200.3.22.1

jetty-server: before 9.4.53-150200.3.22.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234210-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU80792

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-36479

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input in org.eclipse.jetty.servlets.CGI Servlet when quoting a command before its execution. A remote user can force the application to execute arbitrary file on the server and potentially compromise the system.

Mitigation

Update the affected package jetty-minimal to the latest version.

Vulnerable software versions

Development Tools Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP5

SUSE Linux Enterprise Server 15: SP2 - SP5

SUSE Linux Enterprise Real Time 15: SP4 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

openSUSE Leap: 15.4 - 15.5

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.3

SUSE Manager Server: 4.3

SUSE Manager Proxy: 4.3

jetty-jaas: before 9.4.53-150200.3.22.1

jetty-client: before 9.4.53-150200.3.22.1

jetty-deploy: before 9.4.53-150200.3.22.1

jetty-jsp: before 9.4.53-150200.3.22.1

jetty-jmx: before 9.4.53-150200.3.22.1

jetty-xml: before 9.4.53-150200.3.22.1

jetty-http-spi: before 9.4.53-150200.3.22.1

jetty-plus: before 9.4.53-150200.3.22.1

jetty-minimal-javadoc: before 9.4.53-150200.3.22.1

jetty-jndi: before 9.4.53-150200.3.22.1

jetty-annotations: before 9.4.53-150200.3.22.1

jetty-quickstart: before 9.4.53-150200.3.22.1

jetty-continuation: before 9.4.53-150200.3.22.1

jetty-proxy: before 9.4.53-150200.3.22.1

jetty-webapp: before 9.4.53-150200.3.22.1

jetty-fcgi: before 9.4.53-150200.3.22.1

jetty-start: before 9.4.53-150200.3.22.1

jetty-openid: before 9.4.53-150200.3.22.1

jetty-ant: before 9.4.53-150200.3.22.1

jetty-rewrite: before 9.4.53-150200.3.22.1

jetty-servlets: before 9.4.53-150200.3.22.1

jetty-cdi: before 9.4.53-150200.3.22.1

jetty-util-ajax: before 9.4.53-150200.3.22.1

jetty-io: before 9.4.53-150200.3.22.1

jetty-security: before 9.4.53-150200.3.22.1

jetty-servlet: before 9.4.53-150200.3.22.1

jetty-http: before 9.4.53-150200.3.22.1

jetty-util: before 9.4.53-150200.3.22.1

jetty-server: before 9.4.53-150200.3.22.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234210-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU80791

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-40167

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests when handling the "+" character passed via the HTTP/1 header field. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Update the affected package jetty-minimal to the latest version.

Vulnerable software versions

Development Tools Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP5

SUSE Linux Enterprise Server 15: SP2 - SP5

SUSE Linux Enterprise Real Time 15: SP4 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

openSUSE Leap: 15.4 - 15.5

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.3

SUSE Manager Server: 4.3

SUSE Manager Proxy: 4.3

jetty-jaas: before 9.4.53-150200.3.22.1

jetty-client: before 9.4.53-150200.3.22.1

jetty-deploy: before 9.4.53-150200.3.22.1

jetty-jsp: before 9.4.53-150200.3.22.1

jetty-jmx: before 9.4.53-150200.3.22.1

jetty-xml: before 9.4.53-150200.3.22.1

jetty-http-spi: before 9.4.53-150200.3.22.1

jetty-plus: before 9.4.53-150200.3.22.1

jetty-minimal-javadoc: before 9.4.53-150200.3.22.1

jetty-jndi: before 9.4.53-150200.3.22.1

jetty-annotations: before 9.4.53-150200.3.22.1

jetty-quickstart: before 9.4.53-150200.3.22.1

jetty-continuation: before 9.4.53-150200.3.22.1

jetty-proxy: before 9.4.53-150200.3.22.1

jetty-webapp: before 9.4.53-150200.3.22.1

jetty-fcgi: before 9.4.53-150200.3.22.1

jetty-start: before 9.4.53-150200.3.22.1

jetty-openid: before 9.4.53-150200.3.22.1

jetty-ant: before 9.4.53-150200.3.22.1

jetty-rewrite: before 9.4.53-150200.3.22.1

jetty-servlets: before 9.4.53-150200.3.22.1

jetty-cdi: before 9.4.53-150200.3.22.1

jetty-util-ajax: before 9.4.53-150200.3.22.1

jetty-io: before 9.4.53-150200.3.22.1

jetty-security: before 9.4.53-150200.3.22.1

jetty-servlet: before 9.4.53-150200.3.22.1

jetty-http: before 9.4.53-150200.3.22.1

jetty-util: before 9.4.53-150200.3.22.1

jetty-server: before 9.4.53-150200.3.22.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234210-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper Authorization

EUVDB-ID: #VU80793

Risk: Low

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-41900

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to an error in the revocation process. If a Jetty OpenIdAuthenticator uses the optional nested LoginService, and that LoginService decides to revoke an already authenticated user, then the current request will still treat the user as authenticated.

Mitigation

Update the affected package jetty-minimal to the latest version.

Vulnerable software versions

Development Tools Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP5

SUSE Linux Enterprise Server 15: SP2 - SP5

SUSE Linux Enterprise Real Time 15: SP4 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

openSUSE Leap: 15.4 - 15.5

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.3

SUSE Manager Server: 4.3

SUSE Manager Proxy: 4.3

jetty-jaas: before 9.4.53-150200.3.22.1

jetty-client: before 9.4.53-150200.3.22.1

jetty-deploy: before 9.4.53-150200.3.22.1

jetty-jsp: before 9.4.53-150200.3.22.1

jetty-jmx: before 9.4.53-150200.3.22.1

jetty-xml: before 9.4.53-150200.3.22.1

jetty-http-spi: before 9.4.53-150200.3.22.1

jetty-plus: before 9.4.53-150200.3.22.1

jetty-minimal-javadoc: before 9.4.53-150200.3.22.1

jetty-jndi: before 9.4.53-150200.3.22.1

jetty-annotations: before 9.4.53-150200.3.22.1

jetty-quickstart: before 9.4.53-150200.3.22.1

jetty-continuation: before 9.4.53-150200.3.22.1

jetty-proxy: before 9.4.53-150200.3.22.1

jetty-webapp: before 9.4.53-150200.3.22.1

jetty-fcgi: before 9.4.53-150200.3.22.1

jetty-start: before 9.4.53-150200.3.22.1

jetty-openid: before 9.4.53-150200.3.22.1

jetty-ant: before 9.4.53-150200.3.22.1

jetty-rewrite: before 9.4.53-150200.3.22.1

jetty-servlets: before 9.4.53-150200.3.22.1

jetty-cdi: before 9.4.53-150200.3.22.1

jetty-util-ajax: before 9.4.53-150200.3.22.1

jetty-io: before 9.4.53-150200.3.22.1

jetty-security: before 9.4.53-150200.3.22.1

jetty-servlet: before 9.4.53-150200.3.22.1

jetty-http: before 9.4.53-150200.3.22.1

jetty-util: before 9.4.53-150200.3.22.1

jetty-server: before 9.4.53-150200.3.22.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234210-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource exhaustion

EUVDB-ID: #VU81728

Risk: High

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2023-44487

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected package jetty-minimal to the latest version.

Vulnerable software versions

Development Tools Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP5

SUSE Linux Enterprise Server 15: SP2 - SP5

SUSE Linux Enterprise Real Time 15: SP4 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP2 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing LTSS 15: SP3

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

openSUSE Leap: 15.4 - 15.5

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.3

SUSE Manager Server: 4.3

SUSE Manager Proxy: 4.3

jetty-jaas: before 9.4.53-150200.3.22.1

jetty-client: before 9.4.53-150200.3.22.1

jetty-deploy: before 9.4.53-150200.3.22.1

jetty-jsp: before 9.4.53-150200.3.22.1

jetty-jmx: before 9.4.53-150200.3.22.1

jetty-xml: before 9.4.53-150200.3.22.1

jetty-http-spi: before 9.4.53-150200.3.22.1

jetty-plus: before 9.4.53-150200.3.22.1

jetty-minimal-javadoc: before 9.4.53-150200.3.22.1

jetty-jndi: before 9.4.53-150200.3.22.1

jetty-annotations: before 9.4.53-150200.3.22.1

jetty-quickstart: before 9.4.53-150200.3.22.1

jetty-continuation: before 9.4.53-150200.3.22.1

jetty-proxy: before 9.4.53-150200.3.22.1

jetty-webapp: before 9.4.53-150200.3.22.1

jetty-fcgi: before 9.4.53-150200.3.22.1

jetty-start: before 9.4.53-150200.3.22.1

jetty-openid: before 9.4.53-150200.3.22.1

jetty-ant: before 9.4.53-150200.3.22.1

jetty-rewrite: before 9.4.53-150200.3.22.1

jetty-servlets: before 9.4.53-150200.3.22.1

jetty-cdi: before 9.4.53-150200.3.22.1

jetty-util-ajax: before 9.4.53-150200.3.22.1

jetty-io: before 9.4.53-150200.3.22.1

jetty-security: before 9.4.53-150200.3.22.1

jetty-servlet: before 9.4.53-150200.3.22.1

jetty-http: before 9.4.53-150200.3.22.1

jetty-util: before 9.4.53-150200.3.22.1

jetty-server: before 9.4.53-150200.3.22.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234210-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###