Miggo Logo

CVE-2022-2191: Jetty SslConnection does not release pooled ByteBuffers in case of errors

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.63522%
Published
7/7/2022
Updated
1/28/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.eclipse.jetty:jetty-servermaven>= 11.0.0, < 11.0.1011.0.10
org.eclipse.jetty:jetty-servermaven>= 10.0.0, < 10.0.1010.0.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from SslConnection's failure to release pooled ByteBuffers during error handling. The core issue occurs in SSL processing paths where:

  1. Buffers are acquired from RetainableByteBufferPool
  2. Error conditions (like TLS handshake failures) occur
  3. Buffers are not properly released back to the pool

While exact line numbers aren't available, the advisory specifically implicates SslConnection error paths. The DecryptedEndPoint's fill() and flush() methods are critical SSL processing points where buffer acquisition occurs. The vulnerability pattern matches common SSL handler implementations where buffer release might be missed in exception handling blocks. The high confidence comes from the direct correlation between the vulnerability description and these core SSL processing methods in Jetty's architecture.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t `Ssl*onn**tion` *o*s not r*l**s* `*yt**u***r`s in **s* o* *rror *o** p*t*s. *or *x*mpl*, TLS **n*s**k*s t**t r*quir* *li*nt-*ut* wit* *li*nts t**t s*n* *xpir** **rti*i**t*s will tri***r * TLS **n*s**k* *rrors *n* t** `*yt**u***r`s us** to

Reasoning

T** vuln*r**ility st*ms *rom Ssl*onn**tion's **ilur* to r*l**s* pool** *yt**u***rs *urin* *rror **n*lin*. T** *or* issu* o**urs in SSL pro**ssin* p*t*s w**r*: *. *u***rs *r* **quir** *rom R*t*in**l**yt**u***rPool *. *rror *on*itions (lik* TLS **n*s*