Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU26320
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-10241
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1
jetty-unixsocket: before 9.4.16-1
jetty-http2-client: before 9.4.16-1
jetty-spring: before 9.4.16-1
jetty-http-spi: before 9.4.16-1
jetty-cdi: before 9.4.16-1
jetty-osgi-boot: before 9.4.16-1
jetty-osgi-alpn: before 9.4.16-1
jetty-servlet: before 9.4.16-1
jetty-ant: before 9.4.16-1
jetty-util-ajax: before 9.4.16-1
jetty-io: before 9.4.16-1
jetty-proxy: before 9.4.16-1
jetty-alpn-client: before 9.4.16-1
jetty-javax-websocket-client-impl: before 9.4.16-1
jetty-security: before 9.4.16-1
jetty-websocket-api: before 9.4.16-1
jetty-servlets: before 9.4.16-1
jetty-server: before 9.4.16-1
jetty-httpservice: before 9.4.16-1
jetty-fcgi-server: before 9.4.16-1
jetty-http: before 9.4.16-1
jetty-websocket-servlet: before 9.4.16-1
jetty-start: before 9.4.16-1
jetty-osgi-boot-jsp: before 9.4.16-1
jetty-javax-websocket-server-impl: before 9.4.16-1
jetty-http2-server: before 9.4.16-1
jetty-javadoc: before 9.4.16-1
jetty-fcgi-client: before 9.4.16-1
jetty-maven-plugin: before 9.4.16-1
jetty-jsp: before 9.4.16-1
jetty-continuation: before 9.4.16-1
jetty-websocket-common: before 9.4.16-1
jetty-jmx: before 9.4.16-1
jetty-xml: before 9.4.16-1
jetty-alpn-server: before 9.4.16-1
jetty-quickstart: before 9.4.16-1
jetty-jndi: before 9.4.16-1
jetty-infinispan: before 9.4.16-1
jetty-nosql: before 9.4.16-1
jetty-jaspi: before 9.4.16-1
jetty-rewrite: before 9.4.16-1
jetty-websocket-client: before 9.4.16-1
jetty-project: before 9.4.16-1
jetty-client: before 9.4.16-1
jetty-http2-hpack: before 9.4.16-1
jetty-plus: before 9.4.16-1
jetty-http2-http-client-transport: before 9.4.16-1
jetty-deploy: before 9.4.16-1
jetty-annotations: before 9.4.16-1
jetty-osgi-boot-warurl: before 9.4.16-1
jetty-jstl: before 9.4.16-1
jetty-jaas: before 9.4.16-1
jetty-http2-common: before 9.4.16-1
jetty-webapp: before 9.4.16-1
jetty-websocket-server: before 9.4.16-1
jetty-util: before 9.4.16-1
jetty-jspc-maven-plugin: before 9.4.16-1
jetty: before 9.4.16-1
External linkshttp://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2148
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.