CVE-2026-2332
🟡 Monitoruj
W Eclipse Jetty, parser HTTP/1.1 jest podatny na smuggling żądań przez rozszerzenia chunków.
CVSS
7.4
EPSS
0.0%
Exploit
poc
Vendor
eclipse
Opis źródłowy (NVD)
In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the "funky chunks" techniques outlined here: * https://w4ke.info/2025/06/18/funky-chunks.html * https://w4ke.info/2025/10/29/funky-chunks-2.html Jetty terminates chunk extension parsing at \r\n inside quoted strings instead of treating this as an error. POST / HTTP/1.1 Host: localhost Transfer-Encoding: chunked 1;ext="val X 0 GET /smuggled HTTP/1.1 ... Note how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.4 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-14 12:16:21 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 13:31:00 UTC |
Referencje
- https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf (emo@eclipse.org) [Exploit, Vendor Advisory, Mitigation]
- https://gitlab.eclipse.org/security/cve-assignment/-/issues/89 (emo@eclipse.org) [Issue Tracking, Vendor Advisory]