Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
[jetty-announce] CVE-2025-11143 - Jetty - Different parsing of invalid URIs

  Eclipse Jetty Security Advisory - CVE-2025-11143

  Severity: Low (CVSS 3.1)

  Affected component: org.eclipse.jetty:jetty-http

  Affected versions:
  - 9.4.0 through 9.4.58
  - 10.0.0 through 10.0.26
  - 11.0.0 through 11.0.26
  - 12.0.0 through 12.0.30
  - 12.1.0 through 12.1.4

  Fix available (supported open source versions):
  - 12.0.31 (available on Maven Central)
  - 12.1.5 (available on Maven Central)
  - 9.4.x / 10.0.x / 11.0.x - EOL releases, patches available, see details https://webtide.com/end-of-life/

Description:

The Jetty URI parser has key differences to other common parsers when evaluating invalid or unusual URIs. These differences include handling of invalid schemes, improper IPv4-mapped IPv6 addresses,
incorrect IPv6 delimiter priority, and incorrect delimiter priority for # and ? characters relative to @.

Differential parsing of URIs in systems using multiple components may result in security bypass. For example, a component that enforces a blocklist may interpret URIs differently from one that generates a response. At the very least, differential parsing may divulge implementation details.

Weakness: CWE-20 (Improper Input Validation)

Workaround: None.

Credit: https://github.com/zer0yu, https://github.com/P3ngu1nW, https://github.com/9vvert

For full technical details, consult the GitHub security advisory:
https://github.com/jetty/jetty.project/security/advisories/GHSA-wjpw-4j6x-6rwh

The Eclipse Jetty Team

Back to the top