Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
2007-02-07T11:28:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | jetty | jetty_http_server | 4.2.9 | Yes |
Application | jetty | jetty_http_server | 4.2.11 | Yes |
Application | jetty | jetty_http_server | 4.2.12 | Yes |
Application | jetty | jetty_http_server | 4.2.14 | Yes |
Application | jetty | jetty_http_server | 4.2.15 | Yes |
Application | jetty | jetty_http_server | 4.2.16 | Yes |
Application | jetty | jetty_http_server | 4.2.17 | Yes |
Application | jetty | jetty_http_server | 4.2.18 | Yes |
Application | jetty | jetty_http_server | 4.2.19 | Yes |
Application | jetty | jetty_http_server | 4.2.24 | Yes |
Application | jetty | jetty_http_server | 5.1.11 | Yes |
Application | jetty | jetty_http_server | 6.0.1 | Yes |
Application | jetty | jetty_http_server | 6.1.0_pre2 | Yes |