CVE-2025-11143
ADVISORY - githubSummary
The Jetty URI parser has some key differences compared to other common parsers when evaluating invalid or unusual URIs. Specifically:
Invalid Scheme
| URI | Jetty | uri-js (nodejs) | node-url(nodejs) |
|---|---|---|---|
https>://vulndetector.com/path |
scheme=http> |
scheme=https |
invalid URI |
Improper IPv4 mapped IPv6
| URI | Jetty | System.Uri(CSharp) | curl(C) |
|---|---|---|---|
http://[0:0:0:0:0:ffff:127.0.0.1] |
invalid | host=[::ffff:127.0.0.1] |
host=[::ffff:127.0.0.1] |
http://[::ffff:255.255.0.0] |
invalid | host=[::ffff:255.255.0.0] |
host=[::ffff:255.255.0.0] |
Incorrect IPv6 delimeter priority
| URI | Jetty | urllib3(python) | furl(python) | Spring | chromium |
|---|---|---|---|---|---|
http://[normal.com@]vulndetector.com/ |
host=[normal.com@] |
invalid | invalid | ||
http://normal.com[user@vulndetector].com/ |
host=`[noirmal.com@vulndetector | host=normal.com |
invalid | ||
http://normal.com[@]vulndetector.com/ |
host=`normal.com[@] | host=normal.com |
invalid |
Incorrect delimeter priority
| URI | Jetty | urllib3(python) | jersey |
|---|---|---|---|
http://normal.com/#@vulndetector.com |
host=vulndetector.com |
host=normal.com |
host=normal.com |
http://normal.com/?@vulndetector.com |
host=vulndetector.com |
host=normal.com |
host=normal.com |
Impact
Differential parsing of URIs in systems using multiple components may result in security by-pass. For example a component that enforces a black list may interpret the URIs differently from one that generates a response. At the very least, differential parsing may divulge implementation details.
Patches
Patched in Supported Open Source versions.
- 12.1.5 - Supported and available on Maven Central
- 12.0.31 - Supported and available on Maven Central
- 11.0.x - EOL Release, patches available on tuxcare and herodevs
- 10.0.x - EOL Release, patches available on tuxcare and herodevs
- 9.4.x - EOL Release, patches available on tuxcare and herodevs
Workarounds
None
Resources
Common Weakness Enumeration (CWE)
Improper Input Validation
Improper Input Validation
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
NIST
2.2
CVSS SCORE
3.7lowGitHub
2.2
CVSS SCORE
3.7lowDebian
-
Ubuntu
-
CVSS SCORE
N/AmediumRed Hat
2.2
CVSS SCORE
3.7lowminimos
MINI-24g4-5f56-8qg6
-
minimos
MINI-2vmv-xgcx-65wf
-
minimos
MINI-3r8f-wmv2-78xx
-
minimos
MINI-45q5-q8m7-q8xj
-
minimos
MINI-8jp7-6h25-6cww
-
minimos
MINI-c5gx-cph7-3xw7
-
minimos
MINI-cxmw-hcch-chm5
-
minimos
MINI-jx78-qx5f-qqr9
-
minimos
MINI-p98w-42c5-wwvf
-
minimos
MINI-pc67-9895-wf9r
-
minimos
MINI-q7rc-c6mj-865q
-
minimos
MINI-rrff-9p3v-h2wj
-
minimos
MINI-vrgm-6vjq-wm36
-
minimos
MINI-x4gj-qhfm-cm6w
-
minimos
MINI-xhgq-j29r-93q5
-