For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.debian.org/security/2021/dsa-4949
https://security.netapp.com/advisory/ntap-20210727-0009/
https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html
https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq