mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 02:00:45 +00:00
37 lines
1.7 KiB
Markdown
37 lines
1.7 KiB
Markdown
![]() |
### [CVE-2021-28169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28169)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
- https://www.oracle.com/security-alerts/cpuoct2021.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/20142995/Goby
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
- https://github.com/Awrrays/FrameVul
|
||
|
- https://github.com/CLincat/vulcat
|
||
|
- https://github.com/HimmelAward/Goby_POC
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
- https://github.com/Z0fhack/Goby_POC
|
||
|
- https://github.com/antonycc/ondemand-neo4j
|
||
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
- https://github.com/bigblackhat/oFx
|
||
|
- https://github.com/m3n0sd0n4ld/uCVE
|
||
|
- https://github.com/nu1r/yak-module-Nu
|
||
|
- https://github.com/openx-org/BLEN
|
||
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research-list
|
||
|
|