CVE-2021-34429
Java vulnerability analysis and mitigation

Overview

CVE-2021-34429 affects Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5. The vulnerability allows attackers to craft URIs using encoded characters to access the content of the WEB-INF directory and/or bypass security constraints. This is a variation of the vulnerability previously reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5 (GitHub Advisory).

Technical details

The vulnerability exists due to URI parsing behavior where URIs containing encoded characters (like %u002e) can be used to access protected resources within the WEB-INF directory. For example, a request to /%u002e/WEB-INF/web.xml can retrieve the web.xml file. Similarly, an encoded null character can prevent correct normalization, allowing paths like /.%00/WEB-INF/web.xml to access protected files (GitHub Advisory).

Impact

Successful exploitation of this vulnerability could allow attackers to access sensitive information within the WEB-INF directory, which can reveal implementation details of web applications. This could potentially expose configuration files, class files, and other protected resources that should not be directly accessible (GitHub Advisory).

Mitigation and workarounds

The recommended mitigation is to upgrade to Jetty versions 9.4.43, 10.0.6, or 11.0.6 which contain the fix. As a temporary workaround, Jetty rewrite rules can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI to a known not-found resource (GitHub Advisory, NetApp Advisory).

Community reactions

Multiple organizations and projects responded to this vulnerability by updating their Jetty dependencies, including Apache Kafka, Apache ZooKeeper, and Apache HBase. NetApp issued an advisory detailing the impact on their products and provided patches for affected versions (NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • io.airlift:aircompressor-v3
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management