Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-28164

Опубликовано: 01 апр. 2021
Источник: debian
EPSS Критический

Описание

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jetty9fixed9.4.39-1package
jetty9not-affectedbusterpackage
jetty9not-affectedstretchpackage

Примечания

  • https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5

  • https://github.com/eclipse/jetty.project/commit/e412c8a15b3334b30193f40412c0fbc47e478e83

  • Introduced by https://github.com/eclipse/jetty.project/commit/20ef71fe5d709a90c2a5698834fff07b9b4e7ad7 (jetty-9.4.37.v20210219)

EPSS

Процентиль: 100%
0.93485
Критический

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

CVSS3: 5.3
redhat
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

CVSS3: 5.3
nvd
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

CVSS3: 5.3
github
почти 5 лет назад

Authorization Before Parsing and Canonicalization in jetty

CVSS3: 5.3
fstec
почти 5 лет назад

Уязвимость контейнера сервлетов Eclipse Jetty, связанная с ошибками при обработке информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 100%
0.93485
Критический