logo

CVE-2024-9329 org.glassfish.main.admin:rest-service

Package

Manager: maven
Name: org.glassfish.main.admin:rest-service
Vulnerable Version: >=0 <7.0.17

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS: 0.00045 pctl0.13075

Details

Eclipse Glassfish improperly handles http parameters In Eclipse Glassfish versions before 7.0.17, the Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is `/management/domain`. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

Metadata

Created: 2024-09-30T09:30:47Z
Modified: 2024-10-07T18:52:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-jq3f-mfmg-747x/GHSA-jq3f-mfmg-747x.json
CWE IDs: ["CWE-233", "CWE-601"]
Alternative ID: GHSA-jq3f-mfmg-747x
Finding: F156
Auto approve: 1