CVE-2018-12536
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-12536 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 3.7 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity Impact | None |
| Availability Impact | None |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-java-common-jetty | Will not fix |
| Red Hat Satellite 5 | jetty | Will not fix |
| Red Hat JBoss Fuse 7 | jetty | Affected |
| Red Hat JBoss Fuse 6 | jetty | Will not fix |
| Red Hat Enterprise Linux 7 | jetty | Will not fix |
| Red Hat Enterprise Linux 6 | jetty-eclipse | Not affected |
Mitigation
Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.
http://www.eclipse.org/jetty/documentation/current/custom-error-pages.html
CVE description copyright © 2017, The MITRE Corporation
