CVE-2017-7658
Description
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Eclipse Jetty, due to overly tolerant HTTP header parsing, allows request smuggling when intermediaries disagree on content length, bypassing authorization.
Vulnerability
Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations) contain a request smuggling vulnerability stemming from permissive HTTP header parsing [1][2]. When presented with two Content-Length headers, Jetty ignored the second. When presented with both a Content-Length and a Transfer-Encoding: chunked header, Jetty ignored the Content-Length as permitted by RFC 2616 [1]. This tolerant behavior deviates from the stricter requirements of RFC 7230, which considers such combinations invalid [2].
Exploitation
An attacker can craft an HTTP request with conflicting Content-Length and Transfer-Encoding headers or duplicate Content-Length headers [1]. If the server is deployed behind an intermediary (e.g., a reverse proxy or load balancer) that interprets these headers differently—choosing the shorter content length—the intermediary may forward the entire body (including extra data) to Jetty [1][2]. Jetty then interprets the surplus body content as the start of a new (pipelined) request. No authentication or special network position beyond the ability to send HTTP requests to the intermediary is required. The attacker only needs the intermediary to pass along the conflicting headers unchanged.
Impact
Successful exploitation allows an attacker to inject a fake pipelined request that bypasses any authorization checks enforced by the intermediary [1][2]. The fake request is processed by Jetty as if it came from an already-authorized connection or from the intermediary itself. Impact includes unauthorized access to protected resources, privilege escalation, and potential data disclosure depending on the application behind Jetty [2][3].
Mitigation
Fixed versions are 9.2.25.v20180606, 9.3.24.v20180605, and 9.4.11.v20180605 [2][3]. All users should upgrade immediately. No workarounds are documented if patching is not possible. Archived EOL releases (9.2.x and older) will not receive updates and should be replaced with a supported version [2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.eclipse.jetty:jetty-serverMaven | < 9.2.25.v20180606 | 9.2.25.v20180606 |
org.eclipse.jetty:jetty-serverMaven | >= 9.3.0, < 9.3.24.v20180605 | 9.3.24.v20180605 |
org.eclipse.jetty:jetty-serverMaven | >= 9.4.0, < 9.4.11.v20180605 | 9.4.11.v20180605 |
Affected products
2- The Eclipse Foundation/Eclipse Jettyv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
27- github.com/advisories/GHSA-6x9x-8qw9-9pp6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-7658ghsaADVISORY
- www.debian.org/security/2018/dsa-4278ghsavendor-advisoryx_refsource_DEBIANWEB
- www.securityfocus.com/bid/106566ghsavdb-entryx_refsource_BIDWEB
- www.securitytracker.com/id/1041194ghsavdb-entryx_refsource_SECTRACKWEB
- bugs.eclipse.org/bugs/show_bug.cgighsax_refsource_CONFIRMWEB
- lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8%40%3Ccommits.druid.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae%40%3Ccommits.druid.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574%40%3Ccommits.druid.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20181014-0001ghsaWEB
- security.netapp.com/advisory/ntap-20181014-0001/mitrex_refsource_CONFIRM
- support.hpe.com/hpsc/doc/public/displayghsax_refsource_CONFIRMWEB
- www.oracle.com//security-alerts/cpujul2021.htmlmitrex_refsource_MISC
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlghsax_refsource_CONFIRMWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.