Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-28164
Summary
In Eclipse Jetty versions 9.4.37.v20210219 and 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain "%2e" or "%2e%2e" segments to access protected resources within the WEB-INF directory. For example, a request to "/context/%2e/WEB-INF/web.xml" can retrieve the "web.xml" file. This can reveal sensitive information regarding the implementation of a web application.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-200 - Information Exposure
An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.
References
Advisory Timeline
- Published