{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2332","assignerOrgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","state":"PUBLISHED","assignerShortName":"eclipse","dateReserved":"2026-02-11T09:56:25.879Z","datePublished":"2026-04-14T10:59:10.193Z","dateUpdated":"2026-04-15T03:58:12.322Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","shortName":"eclipse","dateUpdated":"2026-04-14T10:59:10.193Z"},"title":"HTTP Request Smuggling via Chunked Extension Quoted-String Parsing","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-444","description":"CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')","type":"CWE"}]}],"affected":[{"vendor":"Eclipse Foundation","product":"Eclipse Jetty","collectionURL":"https://repo.maven.apache.org/maven2","packageName":"pkg://maven/org.eclipse.jetty/jetty-http","repo":"https://github.com/jetty/jetty.project","versions":[{"status":"affected","version":"12.1.0","lessThanOrEqual":"12.1.6","versionType":"semver"},{"status":"affected","version":"12.0.0","lessThanOrEqual":"12.0.32","versionType":"semver"},{"status":"affected","version":"11.0.0","lessThanOrEqual":"11.0.27","versionType":"semver"},{"status":"affected","version":"10.0.0","lessThanOrEqual":"10.0.27","versionType":"semver"},{"status":"affected","version":"9.4.0","lessThanOrEqual":"9.4.59","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:\n  *  https://w4ke.info/2025/06/18/funky-chunks.html\n\n  *  https://w4ke.info/2025/10/29/funky-chunks-2.html\n\n\nJetty terminates chunk extension parsing at \\r\\n inside quoted strings instead of treating this as an error.\n\n\nPOST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n\n\n\nNote how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.","supportingMedia":[{"type":"text/html","base64":false,"value":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:<br><ul><li><span>https://w4ke.info/2025/06/18/funky-chunks.html</span><br></li><li><span>https://w4ke.info/2025/10/29/funky-chunks-2.html</span></li></ul>Jetty terminates chunk extension parsing at&nbsp;<code>\\r\\n</code>&nbsp;inside quoted strings instead of treating this as an error.<br><br>\n<pre>POST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n</pre>\n\n<div><br>Note how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.<br></div>"}]}],"references":[{"url":"https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf","tags":["third-party-advisory"]},{"url":"https://gitlab.eclipse.org/security/cve-assignment/-/issues/89","tags":["issue-tracking"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseSeverity":"HIGH","baseScore":7.4,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}}],"credits":[{"lang":"en","value":"https://github.com/xclow3n","type":"reporter"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-14T00:00:00+00:00","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-2332"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T03:58:12.322Z"}}]}}