CVE-2023-36479

NameCVE-2023-36479
DescriptionEclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3592-1, DSA-5507-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jetty9 (PTS)stretch (security), stretch (lts), stretch9.2.30-0+deb9u2vulnerable
buster9.4.16-0+deb10u1vulnerable
buster (security)9.4.50-4+deb10u2fixed
bullseye9.4.50-4+deb11u1fixed
bullseye (security)9.4.50-4+deb11u2fixed
bookworm9.4.50-4+deb12u2fixed
bookworm (security)9.4.50-4+deb12u3fixed
sid, trixie9.4.54-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jetty9sourcebuster9.4.16-0+deb10u3DLA-3592-1
jetty9sourcebullseye9.4.39-3+deb11u2DSA-5507-1
jetty9sourcebookworm9.4.50-4+deb12u1DSA-5507-1
jetty9source(unstable)9.4.52-1

Notes

https://github.com/eclipse/jetty.project/security/advisories/GHSA-3gh6-v5v9-6v9j
https://github.com/eclipse/jetty.project/pull/9888
Jetty 9.x, 10.x, and 11.x the org.eclipse.jetty.servlets.CGI has been deprecated
and in Jetty 12 entirely removed.
[stretch] - jetty9 <postponed> (Minor issue)

Search for package or bug name: Reporting problems