logo

CVE-2023-28462 fish.payara.server:payara-aggregator

Package

Manager: maven
Name: fish.payara.server:payara-aggregator
Vulnerable Version: >=5.2020.1 <6.2022.1.alpha3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01345 pctl0.79296

Details

Payara Server allows remote attackers to load malicious code on the server once a JNDI directory scan is performed A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.

Metadata

Created: 2023-03-30T21:30:21Z
Modified: 2023-04-10T16:38:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-xc93-587g-mxm7/GHSA-xc93-587g-mxm7.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-xc93-587g-mxm7
Finding: F096
Auto approve: 1