Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-q3k2-1x5q-buhy
Vulnerability ID VCID-q3k2-1x5q-buhy
Aliases CVE-2023-40167
GHSA-hmr7-m48g-48f6
Summary Improper Handling of Length Parameter Inconsistency Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40167.json
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
epss 0.04833 https://api.first.org/data/v1/epss?cve=CVE-2023-40167
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-hmr7-m48g-48f6
cvssv3.1 5.3 https://github.com/eclipse/jetty.project
generic_textual MODERATE https://github.com/eclipse/jetty.project
cvssv3.1 5.3 https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
cvssv3.1_qr MODERATE https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
generic_textual MODERATE https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
ssvc Track https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-40167
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-40167
cvssv3.1 5.3 https://www.debian.org/security/2023/dsa-5507
generic_textual MODERATE https://www.debian.org/security/2023/dsa-5507
ssvc Track https://www.debian.org/security/2023/dsa-5507
cvssv3.1 5.3 https://www.rfc-editor.org/rfc/rfc9110#section-8.6
generic_textual MODERATE https://www.rfc-editor.org/rfc/rfc9110#section-8.6
ssvc Track https://www.rfc-editor.org/rfc/rfc9110#section-8.6
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40167.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/eclipse/jetty.project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:49:57Z/ Found at https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:49:57Z/ Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-40167
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.debian.org/security/2023/dsa-5507
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:49:57Z/ Found at https://www.debian.org/security/2023/dsa-5507
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.rfc-editor.org/rfc/rfc9110#section-8.6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:49:57Z/ Found at https://www.rfc-editor.org/rfc/rfc9110#section-8.6
Exploit Prediction Scoring System (EPSS)
Percentile 0.89484
EPSS Score 0.04833
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:49.549410+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-webapp/CVE-2023-40167.yml 38.0.0