Описание
Security update for jetty-minimal
This update for jetty-minimal fixes the following issues:
Update to version 9.4.42.v20210604
- Fix: bsc#1187117, CVE-2021-28169 - possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory
- Fix: bsc#1184367, CVE-2021-28165 - jetty server high CPU when client send data length > 17408
- Fix: bsc#1184368, CVE-2021-28164 - Normalize ambiguous URIs
- Fix: bsc#1184366, CVE-2021-28163 - Exclude webapps directory from deployment scan
Список пакетов
SUSE Linux Enterprise Module for Development Tools 15 SP2
SUSE Linux Enterprise Module for Development Tools 15 SP3
Ссылки
- Link for SUSE-SU-2021:2005-1
- E-Mail link for SUSE-SU-2021:2005-1
- SUSE Security Ratings
- SUSE Bug 1184366
- SUSE Bug 1184367
- SUSE Bug 1184368
- SUSE Bug 1187117
- SUSE CVE CVE-2021-28163 page
- SUSE CVE CVE-2021-28164 page
- SUSE CVE CVE-2021-28165 page
- SUSE CVE CVE-2021-28169 page
Описание
In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.
Затронутые продукты
Ссылки
- CVE-2021-28163
- SUSE Bug 1184366
Описание
In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
Затронутые продукты
Ссылки
- CVE-2021-28164
- SUSE Bug 1184368
- SUSE Bug 1188438
Описание
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
Затронутые продукты
Ссылки
- CVE-2021-28165
- SUSE Bug 1184367
Описание
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
Затронутые продукты
Ссылки
- CVE-2021-28169
- SUSE Bug 1187117