Vulnerability Note VU#212984

Mortbay Jetty vulnerable to HTTP response splitting

Original Release date: 04 Dec 2007 | Last revised: 03 Dec 2007


Mortbay Jetty is vulnerable to HTTP response splitting, which may allow a remote, unauthenticated attacker to inject various HTTP headers


Mortbay Jetty is a web server that is written in Java. Jetty fails to properly handle HTTP headers with CRLF sequences, which can allow an attacker to inject certain HTTP headers into server responses.


A remote, unauthenticated attacker may be able to perform a cross-site scripting attack, set cookies, or poison a proxy cache.


Apply an update

This issue is addressed in Mortbay Jetty 6.1.6. Details are available in the release notes.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Mort BayAffected25 Oct 200704 Dec 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to  Tomasz Kuczynski for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-5615
  • Date Public: 03 Nov 2007
  • Date First Published: 04 Dec 2007
  • Date Last Updated: 03 Dec 2007
  • Severity Metric: 4.41
  • Document Revision: 3


If you have feedback, comments, or additional information about this vulnerability, please send us email.