Bug 2236340 (CVE-2023-26048)

Summary: CVE-2023-26048 jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Sayan Biswas <sabiswas>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, alampare, alazarot, almacdon, anstephe, apjagtap, asatyam, asoldano, ataylor, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bmaxwell, boliveir, brian.stansberry, ccranfor, cdewolf, chazlett, chfoley, cmiranda, darran.lofthouse, dhanak, diagrawa, dkreling, dosoudil, drichtar, dsimansk, ehelms, emingora, eric.wittmann, fjuma, fmariani, fmongiar, gjospin, gmalinko, ibek, ivassile, iweiss, janstey, jcechace, jkang, jnethert, jpechane, jpoth, jrokos, jross, jscholz, jsherril, jvanek, kverlaen, lbacciot, lball, lgao, lthon, lzap, matzew, mhulan, mizdebsk, mnovotny, mosmerov, msochure, mstefank, msvehla, nmoumoul, nwallace, orabin, pantinor, pcongius, pcreech, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, pskopek, rchan, rguimara, rhuss, rjohnson, rkieley, rowaters, rruss, rstancel, skontopo, smaestri, sthorger, swoodman, tcunning, tom.jenkinson, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jetty-server 9.4.51,jetty-server 10.0.14,jetty-server 11.0.14 Doc Type: ---
Doc Text:
A flaw was found in the jetty-server package. A servlet with multipart support could get an OutOfMemorryError when the client sends a part that has a name but no filename and substantial content. This flaw allows a malicious user to jeopardize the environment by leaving the JVM in an unreliable state.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2238955, 2236676, 2236677, 2236678    
Bug Blocks: 2187890    

Description Patrick Del Bello 2023-08-31 00:42:20 UTC
Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).

https://github.com/jakartaee/servlet/blob/6.0.0/spec/src/main/asciidoc/servlet-spec-body.adoc#32-file-upload
https://github.com/eclipse/jetty.project/pull/9345
https://github.com/eclipse/jetty.project/pull/9344
https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8
https://github.com/eclipse/jetty.project/issues/9076
https://security.netapp.com/advisory/ntap-20230526-0001/

Comment 5 errata-xmlrpc 2023-09-14 09:51:54 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.5.0

Via RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165

Comment 7 errata-xmlrpc 2023-10-04 11:59:32 UTC
This issue has been addressed in the following products:

  RHINT Camel-Springboot 4.0.0

Via RHSA-2023:5441 https://access.redhat.com/errata/RHSA-2023:5441

Comment 8 errata-xmlrpc 2023-12-04 17:56:43 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2023:7639 https://access.redhat.com/errata/RHSA-2023:7639

Comment 9 errata-xmlrpc 2023-12-04 17:57:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2023:7637 https://access.redhat.com/errata/RHSA-2023:7637

Comment 10 errata-xmlrpc 2023-12-04 17:59:10 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2023:7638 https://access.redhat.com/errata/RHSA-2023:7638

Comment 11 errata-xmlrpc 2023-12-04 18:02:19 UTC
This issue has been addressed in the following products:

  EAP 7.4.14

Via RHSA-2023:7641 https://access.redhat.com/errata/RHSA-2023:7641

Comment 13 errata-xmlrpc 2024-02-12 10:37:18 UTC
This issue has been addressed in the following products:

  OpenShift Developer Tools and Services for OCP 4.12

Via RHSA-2024:0778 https://access.redhat.com/errata/RHSA-2024:0778

Comment 14 errata-xmlrpc 2024-02-13 16:52:27 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 8

Via RHSA-2024:0799 https://access.redhat.com/errata/RHSA-2024:0799

Comment 15 errata-xmlrpc 2024-02-13 16:52:56 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 9

Via RHSA-2024:0800 https://access.redhat.com/errata/RHSA-2024:0800

Comment 16 errata-xmlrpc 2024-02-13 16:53:39 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 7

Via RHSA-2024:0798 https://access.redhat.com/errata/RHSA-2024:0798

Comment 17 errata-xmlrpc 2024-02-13 16:54:13 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2024:0801 https://access.redhat.com/errata/RHSA-2024:0801

Comment 18 errata-xmlrpc 2024-02-13 17:08:14 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On

Via RHSA-2024:0804 https://access.redhat.com/errata/RHSA-2024:0804

Comment 19 Paramvir jindal 2024-04-03 03:52:00 UTC
Marking EAP-8 as not affected because EAP 8 GA was released with the fixed version.

Comment 23 errata-xmlrpc 2024-05-28 11:19:55 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:3385 https://access.redhat.com/errata/RHSA-2024:3385