CVE-2021-28164

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-28164
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-28164.json
Aliases
Published
2021-04-01T15:15:14Z
Modified
2023-11-29T08:22:31.262257Z
Details

In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

References

Affected packages

Git / github.com/eclipse/jetty.project

Affected ranges

Type
GIT
Repo
https://github.com/eclipse/jetty.project
Events
Type
GIT
Repo
https://github.com/jetty/jetty.project
Events

Affected versions

jetty-11.*

jetty-11.0.0

jetty-9.*

jetty-9.4.36.v20210114
jetty-9.4.37.v20210219