Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/gather/jetty_web_inf_disclosure.md
Views: 11784
Vulnerable Application
Jetty suffers from a vulnerability where certain encoded URIs and ambiguous paths can access protected files in the WEB-INF
folder.
Versions effected are:
9.4.37.v20210219, 9.4.38.v20210224
9.4.37-9.4.42
10.0.1-10.0.5
11.0.1-11.0.5
Exploitation can obtain any file in the WEB-INF
folder, but web.xml is most likely to have information of value.
CVE-2021-34429
Use the Docker image from ColdFusionX at https://github.com/ColdFusionX/CVE-2021-34429/blob/main/docker-compose.yml
Verification Steps
Install Jetty with an app that contains a
WEB-INF
folderStart msfconsole
Do:
use auxiliary/gather/jetty_web_inf_disclosure
Do:
set rhosts
Do:
run
You should get the contents of a file
Options
FILE
The file in the WEB-INF
folder to retrieve. Defaults to web.xml
CVE
Which vulnerability to use. Options: CVE-2021-34429
, CVE-2021-28164
. Defaults to CVE-2021-34429