Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-1523
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-05 May, 2009 | 17:30
Updated At-23 Oct, 2012 | 03:06

Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

mortbay
mortbay
>>jetty>>Versions up to 6.1.16(inclusive)
cpe:2.3:a:mortbay:jetty:*:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>Versions up to 7.0.0(inclusive)
cpe:2.3:a:mortbay:jetty:*:m2:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.0
cpe:2.3:a:mortbay:jetty:1.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.0.1
cpe:2.3:a:mortbay:jetty:1.0.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.1
cpe:2.3:a:mortbay:jetty:1.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.1.1
cpe:2.3:a:mortbay:jetty:1.1.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.2.0
cpe:2.3:a:mortbay:jetty:1.2.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.0
cpe:2.3:a:mortbay:jetty:1.3.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.1
cpe:2.3:a:mortbay:jetty:1.3.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.2
cpe:2.3:a:mortbay:jetty:1.3.2:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.3
cpe:2.3:a:mortbay:jetty:1.3.3:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.4
cpe:2.3:a:mortbay:jetty:1.3.4:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>1.3.5
cpe:2.3:a:mortbay:jetty:1.3.5:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0
cpe:2.3:a:mortbay:jetty:2.0:alpha1:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0
cpe:2.3:a:mortbay:jetty:2.0:alpha2:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0
cpe:2.3:a:mortbay:jetty:2.0:beta1:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0
cpe:2.3:a:mortbay:jetty:2.0:beta2:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.0
cpe:2.3:a:mortbay:jetty:2.0.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.1
cpe:2.3:a:mortbay:jetty:2.0.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.2
cpe:2.3:a:mortbay:jetty:2.0.2:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.3
cpe:2.3:a:mortbay:jetty:2.0.3:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.4
cpe:2.3:a:mortbay:jetty:2.0.4:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.0.5
cpe:2.3:a:mortbay:jetty:2.0.5:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.0
cpe:2.3:a:mortbay:jetty:2.1.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.1
cpe:2.3:a:mortbay:jetty:2.1.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.2
cpe:2.3:a:mortbay:jetty:2.1.2:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.3
cpe:2.3:a:mortbay:jetty:2.1.3:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.4
cpe:2.3:a:mortbay:jetty:2.1.4:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.5
cpe:2.3:a:mortbay:jetty:2.1.5:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.6
cpe:2.3:a:mortbay:jetty:2.1.6:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.7
cpe:2.3:a:mortbay:jetty:2.1.7:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.b0
cpe:2.3:a:mortbay:jetty:2.1.b0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.1.b1
cpe:2.3:a:mortbay:jetty:2.1.b1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:alpha0:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:alpha1:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:beta0:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:beta1:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:beta2:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:beta3:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2
cpe:2.3:a:mortbay:jetty:2.2:beta4:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.0
cpe:2.3:a:mortbay:jetty:2.2.0:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.1
cpe:2.3:a:mortbay:jetty:2.2.1:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.2
cpe:2.3:a:mortbay:jetty:2.2.2:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.3
cpe:2.3:a:mortbay:jetty:2.2.3:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.4
cpe:2.3:a:mortbay:jetty:2.2.4:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.5
cpe:2.3:a:mortbay:jetty:2.2.5:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.6
cpe:2.3:a:mortbay:jetty:2.2.6:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.7
cpe:2.3:a:mortbay:jetty:2.2.7:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.2.8
cpe:2.3:a:mortbay:jetty:2.2.8:*:*:*:*:*:*:*
mortbay
mortbay
>>jetty>>2.3.0
cpe:2.3:a:mortbay:jetty:2.3.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388cve@mitre.org
N/A
http://jira.codehaus.org/browse/JETTY-1004cve@mitre.org
N/A
http://secunia.com/advisories/34975cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35143cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35225cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35776cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/40553cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/402580cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/CRDY-7RKQCYcve@mitre.org
N/A
http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/34800cve@mitre.org
N/A
http://www.securityfocus.com/bid/35675cve@mitre.org
N/A
http://www.securitytracker.com/id?1022563cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1900cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2010/1792cve@mitre.org
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=499867cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01257.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01259.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01262.htmlcve@mitre.org
N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://jira.codehaus.org/browse/JETTY-1004
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34975
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35143
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35225
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35776
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/40553
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/402580
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.kb.cert.org/vuls/id/CRDY-7RKQCY
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/34800
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/35675
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1022563
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1900
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/1792
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=499867
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01257.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01259.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01262.html
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found