The Geronimo project has learned of a security vulnerability in the Jetty servlet container (6.1.5) included in Geronimo. If you use a Jetty configuration of Geronimo you may be affected by the vulnerability.

This vulnerability impacts Jetty configurations of Geronimo 2.0.1 and 2.0.2.

For specific information regarding the Jetty vulnerability, see
http://www.kb.cert.org/vuls/id/553235

The problem is related to the processing of URLs which contain multiple consecutive forward slash (/) characters that are handled incorrectly (for example . http://foo//../bar).

If your system is susceptible to attacks using such URLs we recommend that you filter these URLs using an application firewall or reverse proxy server.

Alternatively, you can upgrade your Geronimo Jetty server image to utilize the corrected Jetty 6.1.7 jar: - Obtain a jetty-6.1.7.jar from http://repository.codehaus.org/org/mortbay/jetty/jetty/6.1.7/
- Stop your Geronimo Jetty server image
- copy jetty-6.1.7.jar to <geronimo-root>/repository/org/mortbay/jetty/jetty/6.1.7/jetty-6.1.7.jar - remove the jetty 6.1.5 jar: <geronimo-root>/repository/org/mortbay/jetty/jetty/6.1.5/jetty-6.1.5.jar - start the Geronimo Jetty server. The server will now be using the 6.1.7 Jetty jar.

This vulnerability will be fixed in the next release of Geronimo (2.0.3 and/or 2.1) which will include Jetty 6.1.7 correcting the vulnerability.

Reply via email to