For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Configuration 3 (hide)
                                
                                
  | 
                        
Configuration 4 (hide)
                                
                                
  | 
                        
Information
                Published : 2021-06-08 19:15
Updated : 2022-10-25 16:40
NVD link : CVE-2021-28169
Mitre link : CVE-2021-28169
JSON object : View
CWE
                Products Affected
                oracle
- rest_data_services
 - communications_cloud_native_core_policy
 
netapp
- active_iq_unified_manager
 - hci
 - snap_creator_framework
 - management_services_for_element_software
 
eclipse
- jetty
 
debian
- debian_linux
 


