CVE-2022-2047: Jetty invalid URI parsing may produce invalid HttpURI.authority
2.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.73391%
CWE
Published
7/7/2022
Updated
1/29/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.eclipse.jetty:jetty-http | maven | < 9.4.47 | 9.4.47 |
| org.eclipse.jetty:jetty-http | maven | >= 10.0.0, < 10.0.10 | 10.0.10 |
| org.eclipse.jetty:jetty-http | maven | >= 11.0.0, < 11.0.10 | 11.0.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input validation in HttpURI's authority parsing. The advisory specifically calls out incorrect host parsing for URIs like 'http://localhost;/path'. The core issue must exist in the authority parsing workflow:
- parseAuthority() would be responsible for splitting userinfo/host/port components
- setAuthority() would handle storing these parsed values
- Both would lack proper validation for RFC-compliant host characters (semicolons are not allowed in hostnames) The high confidence comes from:
- Direct reference to HttpURI.host field being incorrectly populated
- URI parsing being a core responsibility of HttpURI class
- Historical context that authority parsing is typically handled in these methods in Jetty's architecture