6/13/2023 0 Comments Sun java glassfish![]() Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GlassFish Server. Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). ![]() CVSS 3.0 Base Score 3.1 (Confidentiality impacts). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. Successful attacks require human interaction from a person other than the attacker. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. The supported version that is affected is 3.1.2. Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). This allows remote attackers to obtain potentially sensitive information, perform database operations, or manipulate the demo via a JMX RMI session, aka a "jmx_rmi remote monitoring and control problem." NOTE: this is not an Oracle supported product. The demo feature in Oracle GlassFish Open Source Edition 5.0 has TCP port 7676 open by default with a password of admin for the admin account. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle GlassFish Server accessible data as well as unauthorized access to critical data or complete access to all Oracle GlassFish Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GlassFish Server. CVSS 3.0 Base Score 7.5 (Availability impacts). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GlassFish Server. Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Administration). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). No password is required to access it with the administrator account. ![]() A Glassfish 4.1 server with a default configuration is running on TCP port 4848. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.Īn issue was discovered in Epikur before 20.1.1. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. ![]() A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. ** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.Ī improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password. In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. ![]()
0 Comments
Leave a Reply. |