Overview
Mortbay Jetty is vulnerable to HTTP response splitting, which may allow a remote, unauthenticated attacker to inject various HTTP headers
Description
| Mortbay Jetty is a web server that is written in Java. Jetty fails to properly handle HTTP headers with CRLF sequences, which can allow an attacker to inject certain HTTP headers into server responses. | 
Impact
| A remote, unauthenticated attacker may be able to perform a cross-site scripting attack, set cookies, or poison a proxy cache. | 
Solution
| Apply an update This issue is addressed in Mortbay Jetty 6.1.6. Details are available in the release notes. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.
Other Information
| CVE IDs: | CVE-2007-5615 | 
| Severity Metric: | 4.41 | 
| Date Public: | 2007-11-03 | 
| Date First Published: | 2007-12-04 | 
| Date Last Updated: | 2007-12-04 04:21 UTC | 
| Document Revision: | 3 |