CVE-2021-28169
MEDIUM EXPLOITED NUCLEIEclipse Jetty ConcatServlet - Information Disclosure
Title source: nucleiDescription
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
Nuclei Templates (1)
Eclipse Jetty ConcatServlet - Information Disclosure
MEDIUMby pikpikcu
Shodan:
cpe:"cpe:2.3:a:eclipse:jetty"
References (24)
... and 4 more
Scores
CVSS v3
5.3
EPSS
0.9026
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Details
VulnCheck KEV
2022-08-19
CWE
CWE-200
Status
published
Products (10)
debian/debian_linux
9.0
debian/debian_linux
10.0
eclipse/jetty
< 9.4.41
netapp/active_iq_unified_manager
(2 CPE variants)
netapp/hci
netapp/management_services_for_element_software
netapp/snap_creator_framework
oracle/communications_cloud_native_core_policy
1.14.0
oracle/rest_data_services
< 21.3
org.eclipse.jetty/jetty-servlets
0 - 9.4.41Maven
Published
Jun 09, 2021
Tracked Since
Feb 18, 2026