First published: Thu Apr 01 2021(Updated: )
Eclipse Jetty could allow a remote attacker to obtain sensitive information, caused by improper input validation by the default compliance mode. By sending specially-crafted requests with URIs that contain %2e or %2e%2e segments, an attacker could exploit this vulnerability to access protected resources within the WEB-INF directory, and use this information to launch further attacks against the affected system.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-eclipse-jetty | <0:9.4.40-1.1.el7_9 | 0:9.4.40-1.1.el7_9 |
redhat/jetty | <9.4.39 | 9.4.39 |
Eclipse Jetty | =9.4.37-20210219 | |
Eclipse Jetty | =9.4.38-20210224 | |
Cloud Manager | ||
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.70.1 | |
netapp e-series santricity Web services Web services proxy | ||
NetApp Element Software | ||
NetApp SANtricity Cloud Connector | ||
NetApp SnapCenter | ||
NetApp SnapCenter Plug-in for VMware vSphere | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | >=9.6 | |
NetApp VASA Provider | >=9.6 | |
NetApp Virtual Storage Console for VMware vSphere | >=9.6 | |
Oracle AutoVue for Agile Product Lifecycle Management | =21.0.2 | |
Oracle Banking APIs | =20.1 | |
Oracle Banking APIs | =21.1 | |
Oracle Banking Digital Experience | =20.1 | |
Oracle Banking Digital Experience | =21.1 | |
oracle communications session route manager | >=8.0.0<=8.2.4 | |
Oracle Siebel Core - Automation | <=21.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2021-28164 is medium with a CVSS score of 5.3.
CVE-2021-28164 allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory.
Eclipse Jetty versions 9.4.37.v20210219 to 9.4.38.v20210224 are affected by CVE-2021-28164.
Update your Eclipse Jetty installation to version 9.4.40-1.1.el7_9 or higher, or update your Jetty installation to version 9.4.39 or higher.
You can find more information about CVE-2021-28164 on the CVE website, NVD website, GitHub security advisories, Red Hat Bugzilla, and Red Hat Errata.