Description
Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors.
Remediation
References
http://osvdb.org/42496
http://secunia.com/advisories/27925
http://secunia.com/advisories/30941
http://secunia.com/advisories/35143
http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt
http://www.kb.cert.org/vuls/id/438616
http://www.securityfocus.com/bid/26695
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html
Related Vulnerabilities
CVE-2014-10068 Vulnerability in npm package inert
CVE-2017-5617 Vulnerability in maven package com.metsci.ext.com.kitfox.svg:svg-salamander
CVE-2020-11072 Vulnerability in npm package slp-validate
CVE-2017-15707 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2023-35161 Vulnerability in maven package org.xwiki.platform:xwiki-platform-appwithinminutes-ui