| Vulnerability Name: | CVE-2007-6672 (CCN-39407) | ||||||||
| Assigned: | 2007-12-28 | ||||||||
| Published: | 2007-12-28 | ||||||||
| Updated: | 2012-10-30 | ||||||||
| Summary: | Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' (slash) characters in the URI. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-22 | ||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||
| References: | Source: MITRE Type: CNA CVE-2007-6672 Source: CCN Type: Jetty Web site Jetty - Java HTTP Servlet Server Source: CCN Type: Codehaus Web site [#JETTY-386] Double slash problem Source: CONFIRM Type: UNKNOWN http://jira.codehaus.org/browse/JETTY-386#action_117699 Source: CONFIRM Type: UNKNOWN http://jira.codehaus.org/browse/JETTY/fixforversion/13950 Source: OSVDB Type: UNKNOWN 39855 Source: CCN Type: SA28322 Jetty Information Disclosure Vulnerability Source: SECUNIA Type: Vendor Advisory 28322 Source: CCN Type: SA28547 Openfire Jetty Information Disclosure Vulnerability Source: SECUNIA Type: UNKNOWN 28547 Source: MISC Type: UNKNOWN http://www.igniterealtime.org/community/message/163752 Source: CCN Type: US-CERT VU#553235 Jetty fails to properly process URLs that contain double / characters Source: CERT-VN Type: US Government Resource VU#553235 Source: CCN Type: OSVDB ID: 39855 Jetty URL Multiple Slash Character Information Disclosure Source: BID Type: UNKNOWN 27117 Source: CCN Type: BID-27117 Jetty Double Slash URI Information Disclosure Vulnerability Source: VUPEN Type: UNKNOWN ADV-2008-0079 Source: XF Type: UNKNOWN jetty-characters-information-disclosure(39407) Source: CCN Type: IBM Security Bulletin 6621343 (Control Desk) Provision to add https and Secure Flag to bayeux_browser cookie for IBM Control Desk. | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||