Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-28169 β€” AI Deep Analysis Summary

CVSS 5.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Eclipse Jetty allows attackers to bypass security restrictions via **double URL encoding** in `ConcatServlet` requests.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-200** (Information Exposure). The flaw lies in how Jetty handles **doubly encoded paths**, failing to properly restrict access to internal directories like `WEB-INF`.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: β€’ Jetty **9.4.40** and earlier β€’ Jetty **10.0.2** and earlier β€’ Jetty **11.0.2** and earlier 🏒 **Vendor**: The Eclipse Foundation.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: β€’ Access sensitive files in `WEB-INF`. β€’ **Modify data**. β€’ Execute **unauthorized administrative operations**. β€’ Gain context of the affected site.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. β€’ **Auth**: None required (PR:N). β€’ **Network**: Remote (AV:N). β€’ **UI**: No interaction needed (UI:N). β€’ **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploits**: **YES**. β€’ PoCs available on GitHub (ProjectDiscovery, Vulhub). β€’ Widely documented in mailing lists (Kafka, Debian LTS). β€’ Easy to reproduce with standard tools.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: β€’ Scan for **Jetty** servers. β€’ Check version numbers against the affected list. β€’ Use Nuclei templates (`CVE-2021-28169.yaml`) for automated detection. β€’ Look for `ConcatServlet` endpoints.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. β€’ Upgrade to **Jetty 9.4.41+**. β€’ Upgrade to **Jetty 10.0.3+**. β€’ Upgrade to **Jetty 11.0.3+**. β€’ Patches are available via official Eclipse channels.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: β€’ **Block** access to `ConcatServlet` via WAF/Reverse Proxy. β€’ **Restrict** access to `WEB-INF` directories at the server level. β€’ **Disable** unnecessary servlets if not used.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. β€’ CVSS Score: **5.3** (Medium), but **Remote/No Auth** makes it critical for exposed services. β€’ Many major projects (Kafka, Zookeeper) were impacted.…