CVE-2019-10247
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
22/04/2019
Last modified:
07/11/2023
Description
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:eclipse:jetty:7.0.0:20091005:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_0:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_1:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_2:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_3:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_4:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc0:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.1:20091125:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.2:20100331:*:*:*:*:*:* | ||
| cpe:2.3:a:eclipse:jetty:7.0.2:rc0:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577
- https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
- https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
- https://security.netapp.com/advisory/ntap-20190509-0003/
- https://www.debian.org/security/2021/dsa-4949
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html



