CVE-2021-28164

NameCVE-2021-28164
DescriptionIn Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jetty9 (PTS)buster9.4.16-0+deb10u1fixed
buster (security)9.4.50-4+deb10u2fixed
bullseye9.4.50-4+deb11u1fixed
bullseye (security)9.4.50-4+deb11u2fixed
bookworm9.4.50-4+deb12u2fixed
bookworm (security)9.4.50-4+deb12u3fixed
sid, trixie9.4.54-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jetty9sourcestretch(not affected)
jetty9sourcebuster(not affected)
jetty9source(unstable)9.4.39-1

Notes

[buster] - jetty9 <not-affected> (Vulnerable code introduced later)
[stretch] - jetty9 <not-affected> (Vulnerable code introduced later)
https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5
https://github.com/eclipse/jetty.project/commit/e412c8a15b3334b30193f40412c0fbc47e478e83
Introduced by https://github.com/eclipse/jetty.project/commit/20ef71fe5d709a90c2a5698834fff07b9b4e7ad7 (jetty-9.4.37.v20210219)

Search for package or bug name: Reporting problems