Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28164

Опубликовано: 01 апр. 2021
Источник: redhat
CVSS3: 5.3
EPSS Критический

Описание

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

In Jetty the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. An attacker can use this vulnerability to reveal sensitive information regarding the implementation of a web application.

Отчет

Red Hat OpenStack Platform's OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws. Red Hat CodeReady Studio 12 is not affected by this vulnerability because it does not ship a vulnerable version of jetty.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CodeReady Studio 12jetty-serverNot affected
Red Hat Enterprise Linux 7jettyOut of support scope
Red Hat Enterprise Linux 8eclipse:rhel8/jettyWill not fix
Red Hat Integration Service Registryjetty-serverAffected
Red Hat JBoss A-MQ 6jetty-serverOut of support scope
Red Hat JBoss Fuse 6jettyOut of support scope
Red Hat JBoss Fuse 6jetty-serverOut of support scope
Red Hat OpenShift Container Platform 3.11jenkinsNot affected
Red Hat OpenShift Container Platform 4jenkinsNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-metering-hadoopNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1945712jetty: Ambiguous paths can access WEB-INF

EPSS

Процентиль: 100%
0.93485
Критический

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

CVSS3: 5.3
nvd
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

CVSS3: 5.3
debian
почти 5 лет назад

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default com ...

CVSS3: 5.3
github
почти 5 лет назад

Authorization Before Parsing and Canonicalization in jetty

CVSS3: 5.3
fstec
почти 5 лет назад

Уязвимость контейнера сервлетов Eclipse Jetty, связанная с ошибками при обработке информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 100%
0.93485
Критический

5.3 Medium

CVSS3