4

CVE-2021-28163

Exploit

In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.

Data is provided by the National Vulnerability Database (NVD)
EclipseJetty Version >= 9.4.32 < 9.4.39
EclipseJetty Version10.0.0 Updatebeta2
EclipseJetty Version10.0.1
EclipseJetty Version11.0.0 Update-
EclipseJetty Version11.0.0 Updatebeta2
EclipseJetty Version11.0.0 Updatebeta3
EclipseJetty Version11.0.1
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
ApacheIgnite Version < 2.1.1
ApacheSolr Version8.8.1
NetappCloud Manager Version-
NetappE-series Santricity Os Controller Version >= 11.0.0 <= 11.70.1
NetappE-series Santricity Web Services Version- SwPlatformweb_services_proxy
NetappSnapcenter Version-
NetappSnapcenter Plug-in Version- SwPlatformvmware_vsphere
NetappStorage Replication Adapter For Clustered Data Ontap SwPlatformvmware_vsphere Version >= 9.6
NetappVirtual Storage Console SwPlatformvmware_vsphere Version >= 9.6
OracleBanking Apis Version20.1
OracleBanking Apis Version21.1
OracleCommunications Session Report Manager Version >= 8.0.0 <= 8.2.4.0
OracleCommunications Session Route Manager Version >= 8.0.0 <= 8.2.4.0
OracleSiebel Core - Automation Version <= 21.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.21% 0.436
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
emo@eclipse.org 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

https://www.oracle.com/security-alerts/cpuapr2022.html
Third Party Advisory
Not Applicable