CVE-2023-28462

A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:payara:payara_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:payara:payara_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:payara:payara_server:*:*:*:*:community:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*

History

21 Nov 2024, 07:55

Type Values Removed Values Added
References () https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191 - Mitigation, Vendor Advisory () https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191 - Mitigation, Vendor Advisory

Information

Published : 2023-03-30 20:15

Updated : 2024-11-21 07:55


NVD link : CVE-2023-28462

Mitre link : CVE-2023-28462

CVE.ORG link : CVE-2023-28462


JSON object : View

Products Affected

oracle

  • jdk

payara

  • payara_server