The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Eclipse Jetty: Cross Site Scripting

Synthesis of the vulnerability 

An attacker can trigger a Cross Site Scripting of Eclipse Jetty, in order to run JavaScript code in the context of the web site.
Vulnerable products: Kafka, Debian, Jetty, QRadar SIEM, Snap Creator Framework, SnapManager, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Oracle OIT, Tuxedo, WebLogic, Puppet.
Severity of this weakness: 2/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 23/04/2019.
Références of this bulletin: 6344071, 6344075, cpuapr2020, cpuapr2021, cpujan2020, cpujan2021, cpujul2020, CVE-2019-10241, CVE-2019-10246, CVE-2019-10247, DLA-2661-1, NTAP-20190509-0003, VIGILANCE-VUL-29106.

Description of the vulnerability 

The Eclipse Jetty product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Eclipse Jetty, in order to run JavaScript code in the context of the web site.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity threat impacts software or systems such as Kafka, Debian, Jetty, QRadar SIEM, Snap Creator Framework, SnapManager, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Oracle OIT, Tuxedo, WebLogic, Puppet.

Our Vigil@nce team determined that the severity of this computer threat note is medium.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 3 vulnerabilities.

An attacker with a expert ability can exploit this security threat.

Solutions for this threat 

Eclipse Jetty: version 9.4.17.
The version 9.4.17 is fixed:
  http://www.eclipse.org/jetty/

Eclipse Jetty: version 9.3.27.
The version 9.3.27 is fixed:
  http://www.eclipse.org/jetty/

Eclipse Jetty: version 9.2.28.
The version 9.2.28 is fixed:
  http://www.eclipse.org/jetty/

Apache Kafka: version 2.3.0.
The version 2.3.0 is fixed:
  http://kafka.apache.org/downloads

Continuous Delivery for Puppet Enterprise: version 2.18.2.
The version 2.18.2 is fixed:
  https://puppet.com/

Debian 9: new jetty9 packages.
New packages are available:
  Debian 9: jetty9 9.2.30-0+deb9u1

IBM QRadar SIEM: patch for Components.
A patch is indicated in information sources.

IBM QRadar SIEM: patch for Jetty, ActiveMQ, CXF.
A patch is indicated in information sources.

Oracle Communications: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2647690.1
  https://support.oracle.com/rs?type=doc&id=2654603.1
  https://support.oracle.com/rs?type=doc&id=2652618.1
  https://support.oracle.com/rs?type=doc&id=2653087.1
  https://support.oracle.com/rs?type=doc&id=2653688.1
  https://support.oracle.com/rs?type=doc&id=2652610.1
  https://support.oracle.com/rs?type=doc&id=2653279.1
  https://support.oracle.com/rs?type=doc&id=2652619.1
  https://support.oracle.com/rs?type=doc&id=2652621.1
  https://support.oracle.com/rs?type=doc&id=2652606.1
  https://support.oracle.com/rs?type=doc&id=2653691.1
  https://support.oracle.com/rs?type=doc&id=2653692.1
  https://support.oracle.com/rs?type=doc&id=2647687.1
  https://support.oracle.com/rs?type=doc&id=2652622.1

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Oracle Fusion Middleware: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2633852.1

Oracle Fusion Middleware: CPU of April 2021.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2749094.1

Oracle Fusion Middleware: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2602410.1

Oracle Fusion Middleware: CPU of January 2021.
A Critical Patch Update is available:
  https://www.oracle.com/security-alerts/cpujan2021.html

Wind River Linux: solution (21/05/2019).
The solution is indicated in information sources.
This bulletin fixes more than 100 vulnerabilities, but only the 100 recent vulnerabilities were associated to this bulletin.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an applications vulnerabilities patch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.