Source: jetty9 Version: 9.4.39-1 Severity: important Tags: security upstream Forwarded: https://github.com/eclipse/jetty.project/issues/6263 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for jetty9. CVE-2021-28169[0]: | For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, | it is possible for requests to the ConcatServlet with a doubly encoded | path to access protected resources within the WEB-INF directory. For | example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the | web.xml file. This can reveal sensitive information regarding the | implementation of a web application. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-28169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28169 [1] https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq [2] https://github.com/eclipse/jetty.project/issues/6263 [3] https://github.com/eclipse/jetty.project/commit/1c05b0bcb181c759e98b060bded0b9376976b055 Please adjust the affected versions in the BTS as needed. Regards, Salvatore