CVE-2024-9329 – org.glassfish.main.admin:rest-service
Package
Manager: maven
Name: org.glassfish.main.admin:rest-service
Vulnerable Version: >=0 <7.0.17
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00045 pctl0.13075
Details
Eclipse Glassfish improperly handles http parameters In Eclipse Glassfish versions before 7.0.17, the Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is `/management/domain`. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Metadata
Created: 2024-09-30T09:30:47Z
Modified: 2024-10-07T18:52:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-jq3f-mfmg-747x/GHSA-jq3f-mfmg-747x.json
CWE IDs: ["CWE-233", "CWE-601"]
Alternative ID: GHSA-jq3f-mfmg-747x
Finding: F156
Auto approve: 1