CVE-2018-12538
moderate-risk
Published 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore.
Do I need to act?
-
0.52% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (12)
References (12)
Third Party Advisory
http://www.securitytracker.com/id/1041194
Issue Tracking
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018
Third Party Advisory
https://security.netapp.com/advisory/ntap-20181014-0001/
Third Party Advisory
http://www.securitytracker.com/id/1041194
Issue Tracking
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018
Third Party Advisory
https://security.netapp.com/advisory/ntap-20181014-0001/
49
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
17/34 · Moderate