{"containers":{"cna":{"affected":[{"product":"Eclipse Jetty","vendor":"The Eclipse Foundation","versions":[{"lessThan":"unspecified","status":"affected","version":"9.4.0","versionType":"custom"},{"lessThanOrEqual":"9.4.46","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"unspecified","status":"affected","version":"10.0.0","versionType":"custom"},{"lessThanOrEqual":"10.0.9","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"unspecified","status":"affected","version":"11.0.0","versionType":"custom"},{"lessThanOrEqual":"11.0.9","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":2.7,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-09-01T13:06:30.000Z","orgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","shortName":"eclipse"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q"},{"name":"DSA-5198","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2022/dsa-5198"},{"name":"[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20220901-0006/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@eclipse.org","ID":"CVE-2022-2047","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Eclipse Jetty","version":{"version_data":[{"version_affected":">=","version_value":"9.4.0"},{"version_affected":"<=","version_value":"9.4.46"},{"version_affected":">=","version_value":"10.0.0"},{"version_affected":"<=","version_value":"10.0.9"},{"version_affected":">=","version_value":"11.0.0"},{"version_affected":"<=","version_value":"11.0.9"}]}}]},"vendor_name":"The Eclipse Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario."}]},"impact":{"cvss":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20"}]}]},"references":{"reference_data":[{"name":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q","refsource":"CONFIRM","url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q"},{"name":"DSA-5198","refsource":"DEBIAN","url":"https://www.debian.org/security/2022/dsa-5198"},{"name":"[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"},{"name":"https://security.netapp.com/advisory/ntap-20220901-0006/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20220901-0006/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:24:44.138Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q"},{"name":"DSA-5198","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5198"},{"name":"[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20220901-0006/"}]}]},"cveMetadata":{"assignerOrgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","assignerShortName":"eclipse","cveId":"CVE-2022-2047","datePublished":"2022-07-07T20:45:12.000Z","dateReserved":"2022-06-09T00:00:00.000Z","dateUpdated":"2024-08-03T00:24:44.138Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}