説明
Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.
AI分析AIによる分析
影響を受ける製品
mortbay_jettyjetty
1.0
mortbay_jettyjetty
2.4
mortbay_jettyjetty
3.0
mortbay_jettyjetty
3.1
mortbay_jettyjetty
4.0
mortbay_jettyjetty
4.1
mortbay_jettyjetty
4.2
mortbay_jettyjetty
5
mortbay_jettyjetty
5.1
mortbay_jettyjetty
6
mortbay_jettyjetty
6.1
参照
- http://osvdb.org/42496
- http://secunia.com/advisories/27925
- http://secunia.com/advisories/30941
- http://secunia.com/advisories/35143
- http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt
- http://www.kb.cert.org/vuls/id/438616PatchUS Government Resource
- http://www.securityfocus.com/bid/26695
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html
- http://osvdb.org/42496
- http://secunia.com/advisories/27925
- http://secunia.com/advisories/30941
- http://secunia.com/advisories/35143
- http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt
- http://www.kb.cert.org/vuls/id/438616PatchUS Government Resource
- http://www.securityfocus.com/bid/26695
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html