The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-28169

CVE-2021-28169: Eclipse Jetty Information Disclosure Flaw

CVE-2021-28169 is an information disclosure vulnerability in Eclipse Jetty that allows attackers to access protected WEB-INF resources via doubly encoded paths. This article covers technical details, affected versions, and mitigation.

Updated: May 16, 2026

CVE-2021-28169 Overview

CVE-2021-28169 is an information disclosure vulnerability [CWE-200] in Eclipse Jetty affecting versions <= 9.4.40, <= 10.0.2, and <= 11.0.2. The flaw resides in the ConcatServlet, which fails to properly normalize doubly encoded path segments. Attackers can craft requests containing doubly encoded paths to access protected resources within the WEB-INF directory. A request such as /concat?/%2557EB-INF/web.xml returns the web.xml deployment descriptor, exposing application configuration data, servlet mappings, and other implementation details useful for follow-on attacks.

Critical Impact

Unauthenticated remote attackers can retrieve sensitive deployment descriptors and configuration files from WEB-INF, revealing internal application structure and aiding further compromise.

Affected Products

  • Eclipse Jetty versions <= 9.4.40, <= 10.0.2, and <= 11.0.2
  • Debian Linux 9 and 10; Oracle Communications Cloud Native Core Policy 1.14.0; Oracle REST Data Services
  • NetApp Active IQ Unified Manager, HCI, Management Services for Element Software, and Snap Creator Framework

Discovery Timeline

  • 2021-06-09 - CVE-2021-28169 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-28169

Vulnerability Analysis

The vulnerability is a path traversal and access control bypass in Jetty's ConcatServlet, a utility servlet historically used to concatenate multiple static resources into a single response. The servlet decodes URL-encoded path parameters once before evaluating whether the requested resource lies within the protected WEB-INF namespace. When a path is doubly encoded, the first decode pass produces a still-encoded string that bypasses the protection check, while a subsequent decode by the resource loader resolves the path to a sensitive file.

The practical consequence is unauthorized read access to web.xml, custom configuration files, and any other resource inside WEB-INF. These files frequently contain servlet definitions, filter chains, authentication realm references, datasource JNDI names, and library version information. Attackers use this disclosure to map the application, identify additional vulnerable components, and refine attacks against downstream systems. The EPSS data indicates active interest from threat actors, with the score reflecting a high relative likelihood of exploitation attempts.

Root Cause

The root cause is improper canonicalization of percent-encoded input. The ConcatServlet performs a single URL decode and then compares the result against the WEB-INF prefix to enforce access control. A doubly encoded segment such as %2557 decodes once to %57, which does not match WEB-INF during the check, but is later decoded by the static resource handler to the literal W, allowing access to /WEB-INF/web.xml.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker sends an HTTP GET request to the ConcatServlet endpoint with a doubly encoded path parameter pointing at WEB-INF resources. Exploitation is possible only when the ConcatServlet is explicitly mapped in the target application's deployment descriptor, since it is not enabled by default. A representative request pattern is GET /concat?/%2557EB-INF/web.xml, which returns the file contents in the HTTP response body.

Detection Methods for CVE-2021-28169

Indicators of Compromise

  • HTTP request logs containing %2557, %2545, %2542, or other doubly encoded sequences resolving to WEB-INF or META-INF
  • Successful 200 OK responses to /concat endpoints returning XML or properties content
  • Requests targeting web.xml, jetty-web.xml, or other deployment descriptor files

Detection Strategies

  • Inspect web server access logs for concat path patterns combined with double-encoded segments and alert on matches
  • Deploy WAF rules that decode request paths recursively before applying allow-list checks against WEB-INF and META-INF
  • Correlate outbound reconnaissance scans with subsequent targeted requests to Jetty-hosted applications

Monitoring Recommendations

  • Centralize Jetty access and request logs to a SIEM or data lake for retrospective hunting against doubly encoded payloads
  • Monitor for anomalous 200-response sizes on /concat endpoints, which often indicate successful file retrieval
  • Track Jetty version inventory across production assets to flag systems still running affected releases

How to Mitigate CVE-2021-28169

Immediate Actions Required

  • Upgrade Eclipse Jetty to versions 9.4.41, 10.0.3, 11.0.3, or later as published in the Eclipse Jetty GitHub Security Advisory
  • Audit application web.xml files for any active mapping of org.eclipse.jetty.servlets.ConcatServlet and remove it if not strictly required
  • Apply downstream vendor patches from Debian DSA-4949, the NetApp Security Advisory, and Oracle Critical Patch Updates for October 2021, January 2022, and April 2022

Patch Information

Eclipse fixed the issue by enforcing strict path canonicalization in the ConcatServlet before access control evaluation. The fix rejects requests whose decoded paths resolve into WEB-INF or META-INF. Patched versions are Jetty 9.4.41, 10.0.3, and 11.0.3. Downstream packages from Debian, NetApp, and Oracle ship the corrected Jetty libraries through their respective security advisories.

Workarounds

  • Unmap the ConcatServlet from web.xml if upgrade is not immediately feasible, since the servlet is not enabled by default
  • Configure a reverse proxy or WAF rule that blocks any request path containing %25 followed by hex characters that would decode to a slash, backslash, or WEB-INF substring
  • Restrict access to administrative and utility endpoints using network-level controls or authentication filters at the proxy layer
bash
# Example WAF rule (ModSecurity) blocking doubly encoded WEB-INF access
SecRule REQUEST_URI "@rx (?i)%25(?:57|77)%25?(?:45|65)%25?(?:42|62)" \
    "id:1028169,phase:1,deny,status:403,log,\
    msg:'CVE-2021-28169 Jetty ConcatServlet double-encoded WEB-INF access attempt'"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechEclipse Jetty

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability90.26%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200

  • NVD-CWE-Other
  • Technical References
  • GitHub Security Advisory

  • Apache Kafka Dev Thread

  • Apache Kafka Users Thread

  • Apache Kafka Jira Thread

  • Apache Kafka Jira Thread

  • Apache Kafka Dev Thread

  • Apache Zookeeper Issues Thread

  • Apache Zookeeper Dev Thread

  • Apache Zookeeper Issues Thread

  • Apache Zookeeper Notifications Thread

  • Apache Kafka Jira Thread

  • Apache Kafka Jira Thread

  • Apache Zookeeper Notifications Thread

  • Apache Kafka Jira Thread

  • Apache Zookeeper Issues Thread

  • Apache Kafka Jira Thread

  • Apache Zookeeper Issues Thread

  • Apache Kafka Jira Thread

  • Apache Zookeeper Issues Thread

  • Debian LTS Announcement

  • NetApp Security Advisory
  • Vendor Resources
  • Debian Security Announcement

  • Oracle CPU April 2022

  • Oracle CPU January 2022
  • Related CVEs
  • CVE-2023-26049: Eclipse Jetty Cookie Smuggling Vulnerability

  • CVE-2021-28164: Eclipse Jetty Information Disclosure Bug

  • CVE-2021-28163: Eclipse Jetty Information Disclosure Flaw

  • CVE-2026-2332: Eclipse Jetty HTTP Smuggling Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English