CVE-2023-28462 – fish.payara.server:payara-aggregator
Package
Manager: maven
Name: fish.payara.server:payara-aggregator
Vulnerable Version: >=5.2020.1 <6.2022.1.alpha3
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01345 pctl0.79296
Details
Payara Server allows remote attackers to load malicious code on the server once a JNDI directory scan is performed A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
Metadata
Created: 2023-03-30T21:30:21Z
Modified: 2023-04-10T16:38:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-xc93-587g-mxm7/GHSA-xc93-587g-mxm7.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-xc93-587g-mxm7
Finding: F096
Auto approve: 1