CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
76.9%
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
Vendor | Product | Version | CPE |
---|---|---|---|
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:20091005:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_0:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_1:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_2:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_3:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_4:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:rc0:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:rc1:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:rc3:*:*:*:*:*:* |
eclipse | jetty | 7.0.0 | cpe:2.3:a:eclipse:jetty:7.0.0:rc4:*:*:*:*:*:* |
[
{
"product": "Eclipse Jetty",
"vendor": "The Eclipse Foundation",
"versions": [
{
"status": "affected",
"version": "7.x"
},
{
"status": "affected",
"version": "8.x"
},
{
"lessThanOrEqual": "9.2.27",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.3.26",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.4.16",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
bugs.eclipse.org/bugs/show_bug.cgi?id=546577
lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E
lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
lists.debian.org/debian-lts-announce/2021/05/msg00016.html
security.netapp.com/advisory/ntap-20190509-0003/
www.debian.org/security/2021/dsa-4949
www.oracle.com/security-alerts/cpuapr2020.html
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujan2020.html
www.oracle.com/security-alerts/cpujan2021.html
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/security-alerts/cpuoct2020.html
www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
76.9%