Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.eclipse.jetty.ee8/jetty-ee8-servlets@12.0.0-beta1
purl pkg:maven/org.eclipse.jetty.ee8/jetty-ee8-servlets@12.0.0-beta1
Tags Ghost
Next non-vulnerable version 12.0.3
Latest non-vulnerable version 12.0.3
Risk 1.6
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-thpu-76e5-j3d3
Aliases:
CVE-2023-36479
GHSA-3gh6-v5v9-6v9j
Jetty vulnerable to errant command quoting in CGI Servlet If a user sends a request to a `org.eclipse.jetty.servlets.CGI` Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. For example, if a request references a binary called file” name “here, the escaping algorithm will generate the command line string “file” name “here”, which will invoke the binary named file, not the one that the user requested. ```java if (execCmd.length() > 0 && execCmd.charAt(0) != '"' && execCmd.contains(" ")) execCmd = "\"" + execCmd + "\""; ```
12.0.0-beta2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-02T17:00:16.034498+00:00 GHSA Importer Affected by VCID-thpu-76e5-j3d3 https://github.com/advisories/GHSA-3gh6-v5v9-6v9j 38.1.0