Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6672 to the following vulnerability: Directory traversal vulnerability in Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read arbitrary files via directory traversal sequences in the URI, as demonstrated by files in WEB-INF, related to improper handling of consecutive '/' (slash) characters. References: http://jira.codehaus.org/browse/JETTY-386#action_117699 http://jira.codehaus.org/browse/JETTY/fixforversion/13950 http://www.kb.cert.org/vuls/id/553235
The version of jetty in fedora is jetty5, not jetty6. From the information provided, it is only 6.1.5 and 6.1.6 and thus does not apply. This bug should be closed. I will do so if I do not hear a reply as to why it should not be closed.
Reporter changed to security-response-team by request of Jay Turner.
Current Fedora has 6.1.21 or newer which is not affected by this flaw.