Vulnerability Name:

CVE-2007-6672 (CCN-39407)

Assigned:2007-12-28
Published:2007-12-28
Updated:2012-10-30
Summary:Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' (slash) characters in the URI.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2007-6672

Source: CCN
Type: Jetty Web site
Jetty - Java HTTP Servlet Server

Source: CCN
Type: Codehaus Web site
[#JETTY-386] Double slash problem

Source: CONFIRM
Type: UNKNOWN
http://jira.codehaus.org/browse/JETTY-386#action_117699

Source: CONFIRM
Type: UNKNOWN
http://jira.codehaus.org/browse/JETTY/fixforversion/13950

Source: OSVDB
Type: UNKNOWN
39855

Source: CCN
Type: SA28322
Jetty Information Disclosure Vulnerability

Source: SECUNIA
Type: Vendor Advisory
28322

Source: CCN
Type: SA28547
Openfire Jetty Information Disclosure Vulnerability

Source: SECUNIA
Type: UNKNOWN
28547

Source: MISC
Type: UNKNOWN
http://www.igniterealtime.org/community/message/163752

Source: CCN
Type: US-CERT VU#553235
Jetty fails to properly process URLs that contain double / characters

Source: CERT-VN
Type: US Government Resource
VU#553235

Source: CCN
Type: OSVDB ID: 39855
Jetty URL Multiple Slash Character Information Disclosure

Source: BID
Type: UNKNOWN
27117

Source: CCN
Type: BID-27117
Jetty Double Slash URI Information Disclosure Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2008-0079

Source: XF
Type: UNKNOWN
jetty-characters-information-disclosure(39407)

Source: CCN
Type: IBM Security Bulletin 6621343 (Control Desk)
Provision to add https and Secure Flag to bayeux_browser cookie for IBM Control Desk.

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mortbay_jetty:jetty:6.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mortbay_jetty:jetty:6.1.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mortbay:jetty:6.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mortbay:jetty:6.1.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mortbay_jetty jetty 6.1.5
    mortbay_jetty jetty 6.1.6
    mortbay jetty 6.1.5
    mortbay jetty 6.1.6
    ibm control desk 7.6.1