Miggo Logo

CVE-2011-4461: Improper Input Validation in Jetty

5.3

CVSS Score
3.0

Basic Information

EPSS Score
0.85989%
Published
5/14/2022
Updated
4/19/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.eclipse.jetty:jetty-servermaven<= 8.1.0.RC28.1.0.RC4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Jetty's form parameter processing. The commit 085c79d introduced 'maxFormKeys' checks in Request.java and UrlEncoded.java, indicating these functions previously lacked parameter count limits. UrlEncoded.decodeTo() populated a MultiMap without key restrictions, allowing attackers to trigger hash collisions. Request.extractParameters() called this method without enforcing limits, making both functions critical points of vulnerability. The patch explicitly adds these checks, confirming their role in the exploit.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*tty *.*.*.R** *n* **rli*r *omput*s **s* v*lu*s *or *orm p*r*m*t*rs wit*out r*stri*tin* t** **ility to tri***r **s* *ollisions pr**i*t**ly, w*i** *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (*PU *onsumption) *y s*n*in* m*ny *r**t** p*r*m*t*

Reasoning

T** vuln*r**ility st*ms *rom J*tty's *orm p*r*m*t*r pro**ssin*. T** *ommit ******* intro*u*** 'm*x*ormK*ys' ****ks in `R*qu*st.j*v*` *n* `Url*n*o***.j*v*`, in*i**tin* t**s* *un*tions pr*viously l**k** p*r*m*t*r *ount limits. `Url*n*o***.***o**To()` p