Miggo Logo

CVE-2015-2080: Jetty vulnerable to exposure of sensitive information to unauthenticated remote users

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.99717%
Published
11/9/2018
Updated
1/8/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.eclipse.jetty:jetty-servermaven<= 9.2.8.v201502179.2.9.v20150224

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Jetty's HTTP header parsing logic in HttpParser.java where invalid characters trigger exceptions containing buffer debug information. The key functions are:

  1. parseHeaders() where header validation occurs and exceptions are thrown
  2. IllegalCharacter constructor that formats error messages with buffer contents
  3. BufferUtil methods that convert raw buffer memory (including stale data) to strings These functions would appear in stack traces when processing malicious requests with illegal characters, as they directly handle the vulnerable buffer exposure logic described in advisories and blog posts. The patch would have modified these functions to prevent buffer content leakage in error messages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *x**ption **n*lin* *o** in **lips* J*tty prior to *.*.*.v******** *llows r*mot* *tt**k*rs to o*t*in s*nsitiv* in*orm*tion *rom pro**ss m*mory vi* ill***l ***r**t*rs in *n *TTP *****r, *k* J*tL**k.

Reasoning

T** vuln*r**ility st*ms *rom J*tty's *TTP *****r p*rsin* lo*i* in *ttpP*rs*r.j*v* w**r* inv*li* ***r**t*rs tri***r *x**ptions *ont*inin* *u***r ***u* in*orm*tion. T** k*y *un*tions *r*: *. p*rs******rs() w**r* *****r v*li**tion o**urs *n* *x**ptions