Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xc93-587g-mxm7

Опубликовано: 30 мар. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Payara Server allows remote attackers to load malicious code on the server once a JNDI directory scan is performed

A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.

Пакеты

Наименование

fish.payara.server:payara-aggregator

maven
Затронутые версииВерсия исправления

>= 5.2020.1, < 6.2022.1.Alpha3

6.2022.1.Alpha3

EPSS

Процентиль: 83%
0.02039
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.

EPSS

Процентиль: 83%
0.02039
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502