A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
References
Link | Resource |
---|---|
https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191 | Mitigation Vendor Advisory |
https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191 - Mitigation, Vendor Advisory |
Information
Published : 2023-03-30 20:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28462
Mitre link : CVE-2023-28462
CVE.ORG link : CVE-2023-28462
JSON object : View
Products Affected
oracle
- jdk
payara
- payara_server
CWE