CVE-2002-1178

Jetty <4.1.0 - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in the CGIServlet for Jetty HTTP server before 4.1.0 allows remote attackers to execute arbitrary commands via ..\ (dot-dot backslash) sequences in an HTTP request to the cgi-bin directory.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Matt Moore · textwebappscgi
https://www.exploit-db.com/exploits/21895

References (5)

Core 5
Core References
Vendor Advisory vdb-entry x_refsource_xf
http://www.iss.net/security_center/static/10246.php
Vendor Advisory x_refsource_confirm
http://groups.yahoo.com/group/jetty-announce/message/45
Exploit, Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/5852
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=103358725813039&w=2

Scores

EPSS 0.1045
EPSS Percentile 93.3%

Details

Status published
Products (1)
jetty/jetty_http_server < 4.1.0
Published Oct 11, 2002
Tracked Since Feb 18, 2026