In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
The product's intended functionality exposes information to certain actors in accordance with the developer's security policy, but this information is regarded as sensitive according to the intended security policies of other stakeholders such as the product's administrator, users, or others whose information is being processed.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E | mailing list |
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E | mailing list |
https://www.oracle.com/security-alerts/cpuapr2020.html | third party advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | third party advisory |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | third party advisory |
https://www.oracle.com/security-alerts/cpujan2020.html | third party advisory |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576 | issue tracking vendor advisory |
https://security.netapp.com/advisory/ntap-20190509-0003/ | third party advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | third party advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | third party advisory |
https://www.oracle.com/security-alerts/cpuApr2021.html |