CVE编号
CVE-2018-12538利用情况
暂无补丁情况
官方补丁披露时间
2018-06-23漏洞描述
Jetty是一个纯粹的基于Java的网页服务器和Java Servlet容器。Eclipse Jetty 9.4.0版本至9.4.8版本中存在权限提升漏洞。攻击者可利用该漏洞访问/劫持其他HttpSessions并删除不匹配的HttpSessions。
解决建议
厂商尚未提供漏洞修复方案,请关注厂商主页更新:http://www.eclipse.org/jetty/
参考链接 |
|
---|---|
http://www.securitytracker.com/id/1041194 | |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018 | |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a70533... | |
https://security.netapp.com/advisory/ntap-20181014-0001/ | |
https://www.oracle.com/security-alerts/cpuoct2020.html | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | eclipse | jetty | * |
From (including) 9.4.0 |
Up to (including) 9.4.8 |
||||
运行在以下环境 | |||||||||
应用 | netapp | e-series_santricity_management_plug-ins | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | e-series_santricity_os_controller | * |
From (including) 11.0 |
Up to (including) 11.40 |
||||
运行在以下环境 | |||||||||
应用 | netapp | e-series_santricity_web_services_proxy | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | element_software | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | hyper_converged_infrastructure | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_system_manager | * |
From (including) 3.0.0 |
Up to (including) 3.1.3 |
||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_unified_manager | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | santricity_cloud_connector | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapcenter | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapmanager | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snap_creator_framework | - | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-ant | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-http2-clien | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-httpservice | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-io | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-jaspi | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-javadoc | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-jndi | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-project | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | jetty-websocket-common | * |
Up to (excluding) 9.4.11-2.v20180605.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-ant | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-http2-clien | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-httpservice | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-io | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-jaspi | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-javadoc | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-jndi | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-project | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | jetty-websocket-common | * |
Up to (excluding) 9.4.11-2.v20180605.fc28 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...