For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "9.0"
},
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux"
},
{
"cpes": [
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "1.14.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:communications_cloud_native_core_policy"
},
{
"cpes": [
"cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*"
],
"extracted_events": [
{
"fixed": "21.3"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:rest_data_services"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "9.4.41"
},
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.3"
},
{
"introduced": "11.0.0"
},
{
"fixed": "11.0.3"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*"
}