You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
CVE-2018-12536 - Medium Severity Vulnerability
Vulnerable Libraries - jetty-server-9.3.21.v20170918.jar, jetty-util-9.3.21.v20170918.jar
jetty-server-9.3.21.v20170918.jar
null
path: radle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.3.21.v20170918/563dbc4ac0cb3526f9a21c8f726464970b224a73/jetty-server-9.3.21.v20170918.jar,/root/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.3.21.v20170918/563dbc4ac0cb3526f9a21c8f726464970b224a73/jetty-server-9.3.21.v20170918.jar
Dependency Hierarchy:
jetty-util-9.3.21.v20170918.jar
null
path: /root/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-util/9.3.21.v20170918/99b846478d78f92ef5fb259ba25715a3167c2c15/jetty-util-9.3.21.v20170918.jar
Dependency Hierarchy:
Vulnerability Details
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
Publish Date: 2018-06-27
URL: CVE-2018-12536
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1041194
Fix Resolution: The vendor has issued a fix (9.4.11.v20180605).
9.2.25.v20180606, 9.3.24.v20180605
The vendor advisory is available at:
http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00123.html
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: