{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2332",
"assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
"state": "PUBLISHED",
"assignerShortName": "eclipse",
"dateReserved": "2026-02-11T09:56:25.879Z",
"datePublished": "2026-04-14T10:59:10.193Z",
"dateUpdated": "2026-04-14T13:14:16.734Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
"shortName": "eclipse",
"dateUpdated": "2026-04-14T10:59:10.193Z"
},
"title": "HTTP Request Smuggling via Chunked Extension Quoted-String Parsing",
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')",
"type": "CWE"
}
]
}
],
"affected": [
{
"vendor": "Eclipse Foundation",
"product": "Eclipse Jetty",
"collectionURL": "https://repo.maven.apache.org/maven2",
"packageName": "pkg://maven/org.eclipse.jetty/jetty-http",
"repo": "https://github.com/jetty/jetty.project",
"versions": [
{
"status": "affected",
"version": "12.1.0",
"lessThanOrEqual": "12.1.6",
"versionType": "semver"
},
{
"status": "affected",
"version": "12.0.0",
"lessThanOrEqual": "12.0.32",
"versionType": "semver"
},
{
"status": "affected",
"version": "11.0.0",
"lessThanOrEqual": "11.0.27",
"versionType": "semver"
},
{
"status": "affected",
"version": "10.0.0",
"lessThanOrEqual": "10.0.27",
"versionType": "semver"
},
{
"status": "affected",
"version": "9.4.0",
"lessThanOrEqual": "9.4.59",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"descriptions": [
{
"lang": "en",
"value": "In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:\n * https://w4ke.info/2025/06/18/funky-chunks.html\n\n * https://w4ke.info/2025/10/29/funky-chunks-2.html\n\n\nJetty terminates chunk extension parsing at \\r\\n inside quoted strings instead of treating this as an error.\n\n\nPOST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n\n\n\nNote how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:
\\r\\n inside quoted strings instead of treating this as an error.POST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n