Information Exposure Affecting org.eclipse.jetty:jetty-servlets package, versions [,9.4.41) [10.0.0, 10.0.3) [11.0.0,11.0.3)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JAVA-ORGECLIPSEJETTY-1300835
- published 9 Jun 2021
- disclosed 9 Jun 2021
- credit Unknown
How to fix?
org.eclipse.jetty:jetty-servlets to version 9.4.41, 10.0.3, 11.0.3 or higher.
org.eclipse.jetty:jetty-servlets is an Utility Servlets from Jetty
Affected versions of this package are vulnerable to Information Exposure. Requests to the
WelcomeFilter are able to access protected resources within the
For example, a request to the
ConcatServlet with a URI of
/concat?/%2557EB-INF/web.xml can retrieve the
This occurs because both
WelcomeFilter decode the supplied path to verify it is not within the
META-INF directories. It then uses this decoded path to call
RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded
WEB-INF to bypass this security check.