Bugzilla – Bug 1210620
VUL-0: CVE-2023-26048: jetty-minimal,jetty-websocket: OutOfMemoryError for large multipart without filename read via request.getParameter()
Last modified: 2024-05-06 12:32:56 UTC
CVE-2023-26048 Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory). References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26048 https://www.cve.org/CVERecord?id=CVE-2023-26048 https://github.com/eclipse/jetty.project/issues/9076 https://github.com/eclipse/jetty.project/pull/9344 https://github.com/eclipse/jetty.project/pull/9345 https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8 https://github.com/jakartaee/servlet/blob/6.0.0/spec/src/main/asciidoc/servlet-spec-body.adoc#32-file-upload
Affected: - SUSE:SLE-15-SP2:Update/jetty-minimal 9.4.48 - SUSE:SLE-15-SP2:Update/jetty-websocket 9.4.48 - openSUSE:Factory/jetty-minimal 9.4.48 - openSUSE:Factory/jetty-unixsocket 9.4.48 - openSUSE:Factory/jetty-websocket 9.4.48
SUSE-SU-2023:2539-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1210620, 1210621 CVE References: CVE-2023-26048, CVE-2023-26049 Sources used: openSUSE Leap 15.4 (src): jetty-minimal-9.4.51-150200.3.19.2 openSUSE Leap 15.5 (src): jetty-minimal-9.4.51-150200.3.19.2 Development Tools Module 15-SP4 (src): jetty-minimal-9.4.51-150200.3.19.2 Development Tools Module 15-SP5 (src): jetty-minimal-9.4.51-150200.3.19.2 SUSE Linux Enterprise Real Time 15 SP3 (src): jetty-minimal-9.4.51-150200.3.19.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Time to close
done, closing