Unknown
CVE-2021-28163
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-28163
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- autovue for agile product lifecycle management 21.0.2
- banking apis 20.1
- banking apis 21.1
- banking digital experience 20.1
- banking digital experience 21.1
- cloud manager
- communications element manager 8.2.2
- communications services gatekeeper 7.0
- communications session report manager
- communications session route manager
- e series performance analyzer
- e series santricity os controller
- e series santricity web services
- element plug in for vcenter server
- fedora 32
- fedora 33
- fedora 34
- ignite
- jetty
- jetty 10.0.0
- jetty 10.0.1
- jetty 11.0.0
- jetty 11.0.1
- santricity cloud connector
- siebel core automation
- snapcenter
- snapcenter plug in
- solr 8.8.1
- storage replication adapter for clustered data ontap
- vasa provider for clustered data ontap
- virtual storage console
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: