CVE-2017-7657

Description

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Categories

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 4.84% Top 15%
Vendor Advisory debian.org Vendor Advisory redhat.com
Affected: The Eclipse Foundation Eclipse Jetty
Published at:
Updated at:

References

Link Tags
https://www.debian.org/security/2018/dsa-4278 third party advisory vendor advisory
http://www.securitytracker.com/id/1041194 vdb entry third party advisory
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E mailing list
https://access.redhat.com/errata/RHSA-2019:0910 third party advisory vendor advisory
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E mailing list
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E mailing list
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html third party advisory patch
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E mailing list
https://www.oracle.com/security-alerts/cpuoct2020.html third party advisory patch
https://security.netapp.com/advisory/ntap-20181014-0001/ third party advisory patch
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us third party advisory
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668 third party advisory
https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8%40%3Ccommits.druid.apache.org%3E mailing list
https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae%40%3Ccommits.druid.apache.org%3E mailing list
https://www.oracle.com//security-alerts/cpujul2021.html

Frequently Asked Questions

What is the severity of CVE-2017-7657?
CVE-2017-7657 has been scored as a critical severity vulnerability.
How to fix CVE-2017-7657?
To fix CVE-2017-7657, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2017-7657 being actively exploited in the wild?
It is possible that CVE-2017-7657 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~5% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2017-7657?
CVE-2017-7657 affects The Eclipse Foundation Eclipse Jetty.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.