vulnerability

SUSE: CVE-2023-36479: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Sep 15, 2023
Added
Oct 27, 2023
Modified
May 29, 2025

Description

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

Solution(s)

suse-upgrade-jetty-annotationssuse-upgrade-jetty-antsuse-upgrade-jetty-cdisuse-upgrade-jetty-clientsuse-upgrade-jetty-continuationsuse-upgrade-jetty-deploysuse-upgrade-jetty-fcgisuse-upgrade-jetty-httpsuse-upgrade-jetty-http-spisuse-upgrade-jetty-iosuse-upgrade-jetty-jaassuse-upgrade-jetty-jmxsuse-upgrade-jetty-jndisuse-upgrade-jetty-jspsuse-upgrade-jetty-minimal-javadocsuse-upgrade-jetty-openidsuse-upgrade-jetty-plussuse-upgrade-jetty-proxysuse-upgrade-jetty-quickstartsuse-upgrade-jetty-rewritesuse-upgrade-jetty-securitysuse-upgrade-jetty-serversuse-upgrade-jetty-servletsuse-upgrade-jetty-servletssuse-upgrade-jetty-startsuse-upgrade-jetty-utilsuse-upgrade-jetty-util-ajaxsuse-upgrade-jetty-webappsuse-upgrade-jetty-xml
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.