CVE-2015-2080: Jetty vulnerable to exposure of sensitive information to unauthenticated remote users
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99717%
CWE
Published
11/9/2018
Updated
1/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.eclipse.jetty:jetty-server | maven | <= 9.2.8.v20150217 | 9.2.9.v20150224 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Jetty's HTTP header parsing logic in HttpParser.java where invalid characters trigger exceptions containing buffer debug information. The key functions are:
- parseHeaders() where header validation occurs and exceptions are thrown
- IllegalCharacter constructor that formats error messages with buffer contents
- BufferUtil methods that convert raw buffer memory (including stale data) to strings These functions would appear in stack traces when processing malicious requests with illegal characters, as they directly handle the vulnerable buffer exposure logic described in advisories and blog posts. The patch would have modified these functions to prevent buffer content leakage in error messages.