Jetty WEB-INF 敏感信息泄露漏洞

admin 2023-12-01 13:36:23 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 Jetty WEB-INF 敏感信息泄露漏洞

CVE编号

CVE-2021-34429

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2021-07-16
漏洞描述
Eclipse Jetty 部分版本存在安全漏洞,攻击者可以使用一些编码字符制作 URI 来访问 WEB-INF 目录的内容或绕过一些安全限制。
解决建议
受影响版本:9.4.37 <= Eclipse Jetty <9.4.4310.0.1 <= Eclipse Jetty <10.0.611.0.1 <= Eclipse Jetty <11.0.6建议升级至安全版本,参考以下链接:https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm
参考链接
https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm
https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f4...
https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f4...
https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e...
https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e...
https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803e...
https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9f...
https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9f...
https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e76625...
https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e76625...
https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d0...
https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d0...
https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f107...
https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb...
https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7...
https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7...
https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68...
https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68...
https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132...
https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132...
https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c7...
https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc627...
https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc627...
https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a7...
https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a7...
https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d507...
https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d507...
https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfe...
https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e...
https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e...
https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e81...
https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e81...
https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62...
https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62...
https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4...
https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4...
https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a...
https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2...
https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2...
https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd320...
https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd320...
https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf2...
https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf2...
https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259...
https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259...
https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9...
https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9...
https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0...
https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0...
https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d...
https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d...
https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399b...
https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441...
https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441...
https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e9444079...
https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e9444079...
https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cda...
https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cda...
https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6...
https://security.netapp.com/advisory/ntap-20210819-0006/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 eclipse jetty * From (including) 10.0.1 Up to (excluding) 10.0.6
运行在以下环境
应用 eclipse jetty * From (including) 11.0.1 Up to (excluding) 11.0.6
运行在以下环境
应用 eclipse jetty * From (including) 9.4.37 Up to (excluding) 9.4.43
运行在以下环境
系统 debian_10 jetty9 * Up to (excluding) 9.4.16-0+deb10u1
运行在以下环境
系统 debian_11 jetty9 * Up to (excluding) 9.4.39-3
运行在以下环境
系统 debian_12 jetty9 * Up to (excluding) 9.4.39-3
运行在以下环境
系统 debian_sid jetty9 * Up to (excluding) 9.4.39-3
运行在以下环境
系统 opensuse_Leap_15.3 jetty-jsp * Up to (excluding) 9.4.43-3.12.2
阿里云评分 3.4
  • 攻击路径 远程
  • 攻击复杂度 容易
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-200 信息暴露
CWE-863 授权机制不正确
NVD-CWE-Other
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0