Search for packages
Package details: pkg:maven/org.eclipse.jetty/jetty-server@9.2.26
purl pkg:maven/org.eclipse.jetty/jetty-server@9.2.26
Tags Ghost
Next non-vulnerable version 9.4.57.v20241219
Latest non-vulnerable version 12.0.9
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-7zyh-qpe9-4qas
Aliases:
CVE-2019-10241
GHSA-7vx9-xjhr-rw6h
Cross-site Scripting in Eclipse Jetty In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.
9.2.26.v20180806
Affected by 10 other vulnerabilities.
9.2.27.v20190403
Affected by 9 other vulnerabilities.
9.3.25.v20180904
Affected by 8 other vulnerabilities.
9.3.26.v20190403
Affected by 8 other vulnerabilities.
9.4.15.v20190215
Affected by 11 other vulnerabilities.
9.4.16.v20190411
Affected by 11 other vulnerabilities.
VCID-qquy-s15h-d7bd
Aliases:
CVE-2017-7656
GHSA-84q7-p226-4x5w
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
9.2.26.v20180806
Affected by 10 other vulnerabilities.
9.3.24.v20180605
Affected by 9 other vulnerabilities.
9.4.11.v20180605
Affected by 12 other vulnerabilities.
VCID-uakh-waws-87bk
Aliases:
CVE-2017-7658
GHSA-6x9x-8qw9-9pp6
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
9.2.26.v20180806
Affected by 10 other vulnerabilities.
9.3.24.v20180605
Affected by 9 other vulnerabilities.
9.4.11.v20180605
Affected by 12 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-01T18:11:35.655651+00:00 GitLab Importer Affected by VCID-7zyh-qpe9-4qas https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-server/CVE-2019-10241.yml 36.1.3
2025-07-01T18:10:59.612806+00:00 GitLab Importer Affected by VCID-uakh-waws-87bk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-server/CVE-2017-7658.yml 36.1.3
2025-07-01T18:10:59.353771+00:00 GitLab Importer Affected by VCID-qquy-s15h-d7bd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-server/CVE-2017-7656.yml 36.1.3