CVE-2021-28169

Source
https://cve.org/CVERecord?id=CVE-2021-28169
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-28169.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-28169
Aliases
Downstream
Related
Published
2021-06-09T02:15:06.853Z
Modified
2026-05-18T05:52:50.026517399Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.

Database specific
{
    "unresolved_ranges": [
        {
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "9.0"
                },
                {
                    "last_affected": "10.0"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "debian:debian_linux"
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "1.14.0"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:communications_cloud_native_core_policy"
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*"
            ],
            "extracted_events": [
                {
                    "fixed": "21.3"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:rest_data_services"
        }
    ]
}
References

Affected packages

Git / github.com/jetty/jetty.project

Affected ranges

Type
GIT
Repo
https://github.com/jetty/jetty.project
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "9.4.41"
        },
        {
            "introduced": "10.0.0"
        },
        {
            "fixed": "10.0.3"
        },
        {
            "introduced": "11.0.0"
        },
        {
            "fixed": "11.0.3"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*"
}

Affected versions

jetty-10.*
jetty-10.0.0.beta1
jetty-10.0.2
jetty-11.*
jetty-11.0.0-alpha0
jetty-11.0.0.beta1
jetty-11.0.0.beta2
jetty-11.0.2
jetty-8.*
jetty-8.0.0.RC0
jetty-8.1.0.RC0
jetty-9.*
jetty-9.1.0.M0
jetty-9.1.0.RC0
jetty-9.1.0.RC1
jetty-9.1.0.RC2
jetty-9.1.0.v20131115
jetty-9.1.1.v20140108
jetty-9.1.2.v20140210
jetty-9.1.3.v20140225
jetty-9.1.4.v20140401
jetty-9.2.0.M0
jetty-9.2.0.M1
jetty-9.2.0.RC0
jetty-9.2.0.v20140523
jetty-9.2.0.v20140526
jetty-9.2.1.v20140609
jetty-9.4.10.v20180503
jetty-9.4.12.v20180830
jetty-9.4.13.v20181111
jetty-9.4.14.v20181114
jetty-9.4.15.v20190215
jetty-9.4.2.v20170220
jetty-9.4.26.v20200117
jetty-9.4.27.v20200227
jetty-9.4.28.v20200408
jetty-9.4.32.v20200930
jetty-9.4.36.v20210114
jetty-9.4.37.v20210219
jetty-9.4.39.v20210325
jetty-9.4.6.v20170531

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-28169.json"