
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Eclipse Jetty versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52 contain a vulnerability identified as CVE-2023-36478. The vulnerability was discovered in the HTTP/2 HPACK header processing component, specifically in the MetaDataBuilder.checkSize functionality. This security flaw allows HTTP/2 HPACK header values to exceed their intended size limits due to an integer overflow issue (GitHub Advisory).
The vulnerability stems from an integer overflow in MetaDataBuilder.checkSize where the multiplication of length by 4 in the huffman calculation can result in a negative value. When length is very large and huffman is true, the multiplication operation (length * 4) / 3 overflows, causing length to become negative. This negative value, when added to _size, bypasses the size limit check. Additionally, the vulnerability allows for user-entered HPACK header value sizes to be negative, which can lead to very large buffer allocations when the user-entered size is multiplied by 2 later in the process (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The successful exploitation of this vulnerability can lead to a remote denial of service (DoS) attack. When exploited, an attacker can cause the server to allocate extremely large buffers (up to 2.1GB) repeatedly, potentially exhausting server resources. This can be achieved through specially crafted HTTP/2 requests with manipulated HPACK headers (GitHub Advisory).
The vulnerability has been fixed in Jetty versions 11.0.16, 10.0.16, and 9.4.53. No workarounds are available, and users are strongly advised to upgrade to the patched versions (GitHub Advisory, Jenkins Advisory).
The vulnerability has received significant attention from major organizations. Jenkins addressed this vulnerability in their security advisory, recommending users to update to Jenkins 2.428 or LTS 2.414.3 (Jenkins Advisory). Debian also released security updates for affected packages in their distributions (Debian Advisory). NetApp has conducted investigations across their product line to identify affected systems (NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”