cnvd-2017-27302
Vulnerability from cnvd
Title
Oracle GlassFish Server Open Source Edition路径遍历漏洞
Description
Oracle GlassFish Server Open Source Edition是美国甲骨文(Oracle)公司的一套开源版本的用于构建Java EE(服务器端Java应用程序)的服务器。 Oracle GlassFish Server Open Source Edition 4.1版本中存在目录遍历漏洞。攻击者可借助特制的HTTP GET请求利用该漏洞访问敏感数据。
Severity
Formal description

厂商尚未提供漏洞修复方案,请关注厂商主页更新: http://www.oracle.com/

Reference
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904
Impacted products
Name
Oracle GlassFish Server Open Source Edition 4.1
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-1000028"
    }
  },
  "description": "Oracle GlassFish Server Open Source Edition\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7248\u672c\u7684\u7528\u4e8e\u6784\u5efaJava EE\uff08\u670d\u52a1\u5668\u7aefJava\u5e94\u7528\u7a0b\u5e8f\uff09\u7684\u670d\u52a1\u5668\u3002\r\n\r\nOracle GlassFish Server Open Source Edition 4.1\u7248\u672c\u4e2d\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684HTTP GET\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u654f\u611f\u6570\u636e\u3002",
  "discovererName": "Piotr Karolak of Trustwave\u0027s SpiderLabs",
  "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttp://www.oracle.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-27302",
  "openTime": "2017-09-19",
  "products": {
    "product": "Oracle GlassFish Server Open Source Edition 4.1"
  },
  "referenceLink": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-016/?fid=6904",
  "serverity": "\u4e2d",
  "submitTime": "2017-08-01",
  "title": "Oracle GlassFish Server Open Source Edition\u8def\u5f84\u904d\u5386\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…