VYPR
Moderate severityNVD Advisory· Published Apr 22, 2019· Updated Aug 4, 2024

CVE-2019-10247

CVE-2019-10247

Description

In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Eclipse Jetty versions 7.x-9.4.16 reveal the configured absolute directory base path of each context in HTML output of 404 error pages via the DefaultHandler.

Eclipse Jetty versions 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older suffer from an information disclosure vulnerability in the DefaultHandler. When no Context matches the requested path, the Jetty server returns a 404 error page that includes an HTML list of all configured contexts, displaying the fully qualified directory base resource location for each context [1][2]. The affected handler is part of the default handler tree in both jetty-distribution and jetty-home distributions.

The vulnerability is exploitable without authentication; simply requesting an invalid path on a running Jetty instance triggers the default 404 page. The attack surface includes any Jetty server exposing these endpoints, requiring only network access to the server's HTTP port. No special privileges or user interaction are needed [1][2].

An attacker who observes the 404 error page can learn the absolute filesystem paths for each deployed web application context. This leaked information aids in mapping the server's directory structure, potentially facilitating further attacks such as path traversal or targeted file access. The disclosure is limited to directory paths and does not directly expose file contents or credentials [2].

The issue was fixed in Jetty versions 9.2.28, 9.3.27, 9.4.17, and later releases. Users should upgrade to these or newer versions. For environments where upgrading is not immediately possible, administrators can consider customizing the 404 error handler to suppress context path details [2]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog as of this writing.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.eclipse.jetty:jetty-serverMaven
>= 7.0.0, < 9.2.28.v201904189.2.28.v20190418
org.eclipse.jetty:jetty-serverMaven
>= 9.3.0, < 9.3.27.v201904189.3.27.v20190418
org.eclipse.jetty:jetty-serverMaven
>= 9.4.0, < 9.4.17.v201904189.4.17.v20190418

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

27

News mentions

0

No linked articles in our index yet.