For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
2021-06-09T02:15:06.853
2024-11-21T05:59:14.710
Modified
CVSSv3.1: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | eclipse | jetty | < 9.4.41 | Yes |
Application | eclipse | jetty | < 10.0.3 | Yes |
Application | eclipse | jetty | < 11.0.3 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Application | oracle | communications_cloud_native_core_policy | 1.14.0 | Yes |
Application | oracle | rest_data_services | < 21.3 | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | hci | - | Yes |
Application | netapp | management_services_for_element_software | - | Yes |
Application | netapp | snap_creator_framework | - | Yes |