cve/2019/CVE-2019-10246.md

26 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-10246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10246)
![](https://img.shields.io/static/v1?label=Product&message=Eclipse%20Jetty&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%209.2.27%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-213%3A%20Intentional%20Information%20Exposure&color=brighgreen)
### Description
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
2024-06-22 09:37:59 +00:00
- https://github.com/LibHunter/LibHunter
2024-05-26 14:27:05 +02:00