CVE-2021-28169

NameCVE-2021-28169
DescriptionFor Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2688-1, DSA-4949-1
Debian Bugs989999

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jetty9 (PTS)buster9.4.16-0+deb10u1fixed
buster (security)9.4.16-0+deb10u2fixed
bullseye (security), bullseye9.4.39-3+deb11u1fixed
bookworm, sid9.4.50-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jettysource(unstable)(unfixed)
jetty8source(unstable)(unfixed)
jetty9sourcestretch9.2.30-0+deb9u2DLA-2688-1
jetty9sourcebuster9.4.16-0+deb10u1DSA-4949-1
jetty9source(unstable)9.4.39-2989999

Notes

https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq
https://github.com/eclipse/jetty.project/issues/6263
https://github.com/eclipse/jetty.project/commit/1c05b0bcb181c759e98b060bded0b9376976b055 (v9.4.41)

Search for package or bug name: Reporting problems