Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.
Link | Tags |
---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html | vendor advisory |
http://secunia.com/advisories/30941 | third party advisory |
http://www.kb.cert.org/vuls/id/438616 | us government resource third party advisory patch |
http://www.securityfocus.com/bid/26695 | vdb entry |
http://secunia.com/advisories/35143 | third party advisory |
http://secunia.com/advisories/27925 | third party advisory |
http://osvdb.org/42496 | vdb entry |
http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt |