CVE-2009-4609
https://notcve.org/view.php?id=CVE-2009-4609
The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable. El Dump Servlet en Mort Bay Jetty v6.x y v7.0.0, permite a atacantes remotos obtener información sensible sobre las variables internas y otros datos mediante una petición a la URI que termina en /dump/, como se ha demostrado descubriendo el valor de la variable getPathTranslated. • http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-1523 – Jetty Web Server - Directory Traversal
https://notcve.org/view.php?id=CVE-2009-1523
Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI. Una vulnerabilidad de salto directorio en el servidor HTTP en Mort Bay Jetty versión 5.1.14, versiones 6.x anteriores a 6.1.17, y versiones 7.x hasta 7.0.0.M2, permite a los atacantes remotos acceder a archivos arbitrarios por medio de secuencias de salto de directorio en el URI. • https://www.exploit-db.com/exploits/36318 https://www.exploit-db.com/exploits/18138 http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388 http://jira.codehaus.org/browse/JETTY-1004 http://secunia.com/advisories/34975 http://secunia.com/advisories/35143 http://secunia.com/advisories/35225 http://secunia.com/advisories/35776 http://secunia.com/advisories/40553 http://www.kb.cert.org/vuls/id/402580 http://www.kb.cert.org/vuls/id/CRDY-7RKQCY http: • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2009-1524 – Jetty 6.1.6 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2009-1524
Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Mort Bay Jetty anterior a v6.1.17 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una petición de listado de directorio que contenga el carácter ; (punto y coma). Jetty version 6.1.6 suffers from a cross site scripting vulnerability. • http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388 http://jira.codehaus.org/browse/JETTY-980 http://secunia.com/advisories/34975 http://secunia.com/advisories/40553 http://www.securityfocus.com/bid/34800 http://www.vupen.com/english/advisories/2010/1792 https://bugzilla.redhat.com/show_bug.cgi?id=499867 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-6672
https://notcve.org/view.php?id=CVE-2007-6672
Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' (slash) characters in the URI. Mortbay Jetty versiones 6.1.5 y 6.1.6, permite a atacantes remotos omitir los mecanismos de protección y leer la fuente de archivos por medio de múltiples caracteres "/" (barra diagonal) en el URI. • http://jira.codehaus.org/browse/JETTY-386#action_117699 http://jira.codehaus.org/browse/JETTY/fixforversion/13950 http://osvdb.org/39855 http://secunia.com/advisories/28322 http://secunia.com/advisories/28547 http://www.igniterealtime.org/community/message/163752 http://www.kb.cert.org/vuls/id/553235 http://www.securityfocus.com/bid/27117 http://www.vupen.com/english/advisories/2008/0079 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2007-5615
https://notcve.org/view.php?id=CVE-2007-5615
CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección de retorno de carro y salto de línea (CRLF) en Mortbay Jetty anterior a 6.1.6rc0 permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP mediante vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html http://osvdb.org/42495 http://secunia.com/advisories/27925 http://secunia.com/advisories/30941 http://secunia.com/advisories/35143 http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt http://www.kb.cert.org/vuls/id/212984 http://www.securityfocus.com/bid/26696 https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html https://www.redhat.com/archives/fedora-package-announce/2008- • CWE-94: Improper Control of Generation of Code ('Code Injection') •