In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
22 Apr 2022, 20:09
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4949Â - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fmw_platform:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fmw_platform:12.2.1.3.0:*:*:*:*:*:*:* |
20 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-04-22 20:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-10247
Mitre link : CVE-2019-10247
CVE.ORG link : CVE-2019-10247
JSON object : View
Products Affected
oracle
- communications_session_report_manager
- communications_session_route_manager
- flexcube_core_banking
- hospitality_guest_access
- retail_xstore_point_of_service
- unified_directory
- flexcube_private_banking
- fmw_platform
- enterprise_manager_base_platform
- communications_analytics
- data_integrator
- communications_services_gatekeeper
- communications_element_manager
- autovue
- endeca_information_discovery_integrator
netapp
- snap_creator_framework
- element
- virtual_storage_console
- snapmanager
- snapcenter
- oncommand_system_manager
- vasa_provider_for_clustered_data_ontap
- storage_replication_adapter_for_clustered_data_ontap
- storage_services_connector
debian
- debian_linux
eclipse
- jetty