Update CVE-2021-28164.yml

patch-1
sandeep 2021-06-09 14:38:12 +05:30
parent 23cb4c4d9f
commit eef5158207
1 changed files with 3 additions and 3 deletions

View File

@ -4,12 +4,12 @@ info:
name: Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability
author: noamrathaus
severity: high
reference: |
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5
description: |
Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check.
reference: |
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5
tags: cve,cve2021,jetty
requests: