Search for packages
| purl | pkg:maven/org.eclipse.jetty/jetty-webapp@9.4.37 |
| Tags | Ghost |
| Next non-vulnerable version | 9.4.52.v20230823 |
| Latest non-vulnerable version | 11.0.16 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3f6t-fkt7-wub9
Aliases: CVE-2021-34429 GHSA-vjv5-gp2w-65vm |
Information Exposure For Eclipse Jetty, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. Affected by 4 other vulnerabilities. Affected by 4 other vulnerabilities. |
|
VCID-p7cu-h519-83hx
Aliases: CVE-2021-28164 GHSA-v7ff-8wcx-gmc5 |
Authorization Before Parsing and Canonicalization in jetty Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS. |
Affected by 6 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-02T16:57:34.290899+00:00 | GHSA Importer | Affected by | VCID-3f6t-fkt7-wub9 | https://github.com/advisories/GHSA-vjv5-gp2w-65vm | 38.1.0 |
| 2026-04-02T16:56:22.975675+00:00 | GHSA Importer | Affected by | VCID-p7cu-h519-83hx | https://github.com/advisories/GHSA-v7ff-8wcx-gmc5 | 38.1.0 |
| 2026-04-02T12:38:10.734145+00:00 | GitLab Importer | Affected by | VCID-p7cu-h519-83hx | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-webapp/CVE-2021-28164.yml | 38.0.0 |
| 2026-04-01T12:48:35.809718+00:00 | GitLab Importer | Affected by | VCID-3f6t-fkt7-wub9 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-webapp/CVE-2021-34429.yml | 38.0.0 |