vulnerability

SUSE: CVE-2022-2047: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Jul 7, 2022
Added
Mar 20, 2023
Modified
Mar 20, 2023

Description

In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.

Solutions

suse-upgrade-jetty-annotationssuse-upgrade-jetty-antsuse-upgrade-jetty-cdisuse-upgrade-jetty-clientsuse-upgrade-jetty-continuationsuse-upgrade-jetty-deploysuse-upgrade-jetty-fcgisuse-upgrade-jetty-httpsuse-upgrade-jetty-http-spisuse-upgrade-jetty-iosuse-upgrade-jetty-jaassuse-upgrade-jetty-javax-websocket-client-implsuse-upgrade-jetty-javax-websocket-server-implsuse-upgrade-jetty-jmxsuse-upgrade-jetty-jndisuse-upgrade-jetty-jspsuse-upgrade-jetty-minimal-javadocsuse-upgrade-jetty-openidsuse-upgrade-jetty-plussuse-upgrade-jetty-proxysuse-upgrade-jetty-quickstartsuse-upgrade-jetty-rewritesuse-upgrade-jetty-securitysuse-upgrade-jetty-serversuse-upgrade-jetty-servletsuse-upgrade-jetty-servletssuse-upgrade-jetty-startsuse-upgrade-jetty-utilsuse-upgrade-jetty-util-ajaxsuse-upgrade-jetty-webappsuse-upgrade-jetty-websocket-apisuse-upgrade-jetty-websocket-clientsuse-upgrade-jetty-websocket-commonsuse-upgrade-jetty-websocket-javadocsuse-upgrade-jetty-websocket-serversuse-upgrade-jetty-websocket-servletsuse-upgrade-jetty-xml
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.