Lucene search

K
githubGitHub Advisory DatabaseGHSA-MQ4X-8WHH-JX73
HistoryMay 01, 2022 - 7:02 a.m.

Improper Input Validation in Mortbay Jetty

2022-05-0107:02:10
CWE-20
GitHub Advisory Database
github.com
13

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

71.0%

jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations.

Affected configurations

Vulners
Node
org.mortbay.jetty\Matchjetty
CPENameOperatorVersion
org.mortbay.jetty:jettylt6.0.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

71.0%

Related for GHSA-MQ4X-8WHH-JX73