Bug 546576 (CVE-2019-10246) - Jetty CVE Request: Information Reveal - Windows Directory Listings
Summary: Jetty CVE Request: Information Reveal - Windows Directory Listings
Status: RESOLVED FIXED
Alias: CVE-2019-10246
Product: Community
Classification: Eclipse Foundation
Component: Vulnerability Reports (show other bugs)
Version: unspecified   Edit
Hardware: PC Windows All
: P3 normal (vote)
Target Milestone: ---   Edit
Assignee: Security vulnerabilitied reported against Eclipse projects CLA
QA Contact:
URL: https://cve.mitre.org/cgi-bin/cvename...
Whiteboard:
Keywords: security
Depends on:
Blocks:
 
Reported: 2019-04-18 16:32 EDT by Joakim Erdfelt CLA
Modified: 2022-10-06 00:02 EDT (History)
5 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Joakim Erdfelt CLA 2019-04-18 16:32:53 EDT
As reported at https://github.com/eclipse/jetty.project/issues/3549

This only impacts users using Eclipse Jetty on Windows.
And have a DefaultServlet or ResourceHandler providing directory content listings.

Impacts Versions:

* 9.2.27.v20190403
* 9.3.26.v20190403
* 9.4.16.v20190411
Comment 1 Joakim Erdfelt CLA 2019-04-18 16:51:19 EDT
This reveals the full system path of the base resources configured on the various contexts on the system.

CVSS score for this is ...

https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.3 (Medium)
Comment 2 Joakim Erdfelt CLA 2019-04-18 17:03:38 EDT
Please publish on Monday April 22nd.

These is the text we should include in the CVE report ...

--(start)--

The server running on Windows is vulnerable to exposure of the fully
qualified Base Resource directory name on Windows to a remote client
when it is configured for showing a Listing of directory contents.
This information reveal is restricted to only the content in the
configured base resource directories.

Example:  If you had configured your base resource directory such as
 C:\applications\appname\webapps\private.war  then the response content
produced during a directory listing will show the entire name
 "C:\applications\appname\webapps\private.war" in the HTML output.

Versions affected: 
  9.2.27.v20190403
  9.3.26.v20190403
  9.4.16.v20190411

Resolved:
  9.2.28.v20190418
  9.3.27.v20190418
  9.4.17.v20190418

--(end)--

Note: the specific versions where this is resolved are not available in the various public locations yet, as they are undergoing review.
This section might be updated if issues are discovered.
Comment 3 Jesse McConnell CLA 2019-04-18 17:33:19 EDT
Again, in lieu of the CVSS, CWE-213
Comment 4 Wayne Beaton CLA 2019-04-22 13:43:58 EDT
Pull request: https://github.com/CVEProject/cvelist/pull/1931
Comment 5 Tony Homer CLA 2019-05-02 11:06:58 EDT
The “Known Affected Software Configurations” on the CVE page states "Up to (including)" the listed versions.
The description (and Joakim's description) reads as if this only affects the three listed versions.
Can the description be adjusted to state clearly that this affects "Up to (including)" those three versions (or not)?
Thanks!
Comment 6 Jesse McConnell CLA 2019-05-02 11:18:59 EDT
Wayne, what is the process to update this?

----

Versions affected: 
  9.2.0.v20140526 - 9.2.27.v20190403
  9.3.0.v20150612 - 9.3.26.v20190403
  9.4.0.v20161208 - 9.4.16.v20190411
Comment 7 Joakim Erdfelt CLA 2019-05-02 11:33:46 EDT
Incorrect Jesse.

This CVE impacts only those 3 specific versions.
No version ranges.

* 9.2.27.v20190403
* 9.3.26.v20190403
* 9.4.16.v20190411
Comment 8 Jesse McConnell CLA 2019-05-02 11:38:27 EDT
Ouch, I was thinking of a different one then. Thanks! For future reference though, Wayne, is updating something here correct or should we make a PR against the CVE issue that you link?
Comment 9 Tony Homer CLA 2019-05-02 11:42:08 EDT
Thanks for your quick responses!
Based on #7, the configurations listed at https://nvd.nist.gov/vuln/detail/CVE-2019-10246 are wrong (see below) and should be updated.

Wrong (but currently listed) on https://nvd.nist.gov/vuln/detail/CVE-2019-10246:
Known Affected Software Configurations Switch to CPE 2.2
Configuration 1 ( hide )
 cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
Up to (including)
9.2.26
 cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
From (including)
9.3.0	Up to (including)
9.3.26
 cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
From (including)
9.4.0	Up to (including)
9.4.16
Running on/with
 cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
     Show Matching CPE(s)
Comment 10 Wayne Beaton CLA 2019-05-02 11:46:52 EDT
(In reply to Jesse McConnell from comment #8)
> Ouch, I was thinking of a different one then. Thanks! For future reference
> though, Wayne, is updating something here correct or should we make a PR
> against the CVE issue that you link?

It's best, IMHO, to keep the related discussion in one location. To update CVE, please comment on and reopen the bug. If I don't respond in a day or two, ping security@eclipse.org.
Comment 11 Wayne Beaton CLA 2019-05-02 11:54:59 EDT
The report that I pushed [1] specified just those particular versions. My parsing of the rules is that a version_affected of "=" means that exact version.

I'll open an issue to ask for guidance.

[1] https://github.com/CVEProject/cvelist/blob/master/2019/10xxx/CVE-2019-10246.json
Comment 12 Wayne Beaton CLA 2019-05-02 12:06:09 EDT
> I'll open an issue to ask for guidance.

https://github.com/CVEProject/cvelist/issues/1962
Comment 13 Wayne Beaton CLA 2019-05-16 15:18:45 EDT
(In reply to Wayne Beaton from comment #12)
> > I'll open an issue to ask for guidance.
> 
> https://github.com/CVEProject/cvelist/issues/1962

The Mitre folks have confirmed that the information that we provided to them conforms to their schema, have pointed me to the folks at NIST, and have closed the issue. I can't find an obvious link to an issue tracker, so I've sent a note to the NIST team. I'll update here when/if I receive a response.

I'm reopening the bug so that this stays on our radar.
Comment 14 Joakim Erdfelt CLA 2019-05-16 16:20:56 EDT
I think we (Eclipse) have done what we can.
I say we don't worry about the bad data representation at NIST.

It's not like the data is harmfully bad, it's just a niggle.
Besides, once this issue goes public, people should be able to find it via searching for "CVE-2019-10246" and see what the authoritative opinion on this is.
Comment 15 Tony Homer CLA 2019-05-16 23:11:39 EDT
@wayne thanks for pursuing this.

@joakim I respectfully disagree about it being a niggle.  The mismatch between description and Known Affected Software Configurations makes it impossible to know which is correct without coming here to find out.
Comment 16 Joakim Erdfelt CLA 2019-05-17 08:59:27 EDT
The updated NIST report cpeVersion 2.2 (from May 16th, 2019) shows only 1 version (no ranges).

https://nvd.nist.gov/vuln/detail/CVE-2019-10246?cpeVersion=2.2

The CVE details are also correct at this point in time.

https://www.cvedetails.com/cve/CVE-2019-10246/
Comment 17 Wayne Beaton CLA 2019-05-17 09:02:33 EDT
I sent an email to NIST yesterday and they responded immediately. Thanks for bring this to my attention.