A vulnerability in the Jetty HTTP server could allow a remote attacker to gain access to files outside of the normal document tree.
Jetty provides an HTTP server, HTTP client, and javax.servlet container. An error in the way canonical paths are interpreted in the HTTP server's URI handler results in a directory traversal vulnerability. This vulnerability affects all versions of Jetty up to and including jetty 6.1.16 and 7.0.0.M2. In order for a system to be vulnerable, it must either be using the DefaultServlet with support for aliases explicitly enabled or the ResourceHandler class to serve static content. The vendor reports that systems running Jetty on Unix-like operating systems must also contain a directory name ending a '?' character in the web application or document root in order to be vulnerable.
A remote attacker can access files outside of the web application or document root by supplying a crafted URL to an vulnerable system.
Upgrade or apply a patch from the vendor
Jetty version 6.1.17 has been published to address this vulnerability. Users are encouraged to upgrade to this version.
The vendor has described the following workarounds for users who are unable to update their software:
Systems using Jetty versions 6.1.16 and earlier, and versions 7.0.0M2 and earlier.
Thanks to Greg Wilkins of Mort Bay Consulting for reporting this vulnerability.
|Date First Published:||2009-05-01|
|Date Last Updated:||2009-05-02 01:28 UTC|