[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2024-2408 --- jetty

ID: oval:org.secpod.oval:def:1702020Date: (C)2024-02-07   (M)2024-02-07
Class: PATCHFamily: unix




For Eclipse Jetty versions less than= 9.4.40, less than= 10.0.2, less than= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application

Platform:
Amazon Linux 2
Product:
jetty
Reference:
ALAS2-2024-2408
CVE-2021-28169
CVE    1
CVE-2021-28169
CPE    1
cpe:/o:amazon:linux:2

© SecPod Technologies