CVE Vulnerabilities

CVE-2021-28169

Published: Jun 09, 2021 | Modified: Nov 07, 2023
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

Affected Software

Name Vendor Start Version End Version
Jetty Eclipse * 9.4.41 (excluding)
Jetty Eclipse 10.0.0 (including) 10.0.3 (excluding)
Jetty Eclipse 11.0.0 (including) 11.0.3 (excluding)
Red Hat AMQ 7.9.0 RedHat jetty-server *
Red Hat AMQ Streams 1.8.0 RedHat jetty-server *
Red Hat Fuse 7.10 RedHat jetty *
Red Hat Integration Camel Quarkus RedHat jetty *
Red Hat OpenShift Container Platform 4.9 RedHat jenkins-0:2.289.3.1630554997-1.el8 *
RHINT Camel-K 1.8.1 RedHat jetty *
Jetty Ubuntu trusty *
Jetty Ubuntu trusty/esm *
Jetty Ubuntu xenial *
Jetty8 Ubuntu trusty *
Jetty8 Ubuntu trusty/esm *
Jetty8 Ubuntu xenial *
Jetty9 Ubuntu bionic *
Jetty9 Ubuntu groovy *
Jetty9 Ubuntu hirsute *
Jetty9 Ubuntu impish *
Jetty9 Ubuntu kinetic *
Jetty9 Ubuntu lunar *
Jetty9 Ubuntu mantic *
Jetty9 Ubuntu trusty *
Jetty9 Ubuntu xenial *

References