CVE-2009-4611: Improper input validation in Mort Bay Jetty
7.3
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.mortbay.jetty:jetty | maven | >= 6.0.0, < 6.1.23 | 6.1.23 |
org.mortbay.jetty:jetty | maven | >= 7.0.0, < 7.0.2 | 7.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from improper input validation in three specific components: (1) The CookieDump
servlet's handleForm
method processes the 'Age' parameter without ensuring it is a valid integer, leading to unescaped exception messages. (2) The expr.jsp
page reflects the 'A' parameter without sanitization, allowing escape sequences in error outputs. (3) Jetty
's core HTTP
parser fails to validate the Content-Length
header as numeric, causing exceptions with unsanitized values. All three scenarios involve unvalidated user input being included in error traces, which are then written to logs/terminals
without escaping control characters. The advisory explicitly identifies these entry points, and their code paths are consistent with the described exploit vectors.