-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review HttpRequest URI construction (CVE-2022-2047) #8014
Comments
sbordet
added a commit
that referenced
this issue
May 17, 2022
Now always adding a "/" before the path, if not already present. Disabled flakey HTTP/3 test. Signed-off-by: Simone Bordet <[email protected]>
sbordet
added a commit
that referenced
this issue
May 23, 2022
Fixes after review in HttpURI. Signed-off-by: Simone Bordet <[email protected]>
sbordet
added a commit
that referenced
this issue
May 23, 2022
More fixes after review in HttpURI. Signed-off-by: Simone Bordet <[email protected]>
gregw
added a commit
that referenced
this issue
May 24, 2022
sbordet
added a commit
that referenced
this issue
Jun 8, 2022
Now always adding a "/" before the path, if not already present. Parse CONNECT URIs as Authority Co-authored-by: Greg Wilkins <[email protected]> (cherry picked from commit d1e64f4)
sbordet
added a commit
that referenced
this issue
Jun 8, 2022
Now always adding a "/" before the path, if not already present. Parse CONNECT URIs as Authority Co-authored-by: Greg Wilkins <[email protected]> (cherry picked from commit d1e64f4)
joakime
changed the title
Review HttpRequest URI construction
Review HttpRequest URI construction (CVE-2022-2047)
Jul 7, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Jetty version(s)
10.0.x
Description
Certain URIs may be misconstructed by
HttpRequest
, possibly resulting in a wrongHost
header.Fixes Security Advisory
GHSA-cj7v-27pg-wf7q
CVE-2022-2047
The text was updated successfully, but these errors were encountered: