In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
References
Link | Resource |
---|---|
https://github.com/eclipse-ee4j/glassfish/pull/25106 | Exploit Patch |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 | Exploit Vendor Advisory |
Configurations
History
07 Oct 2024, 15:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Eclipse glassfish
Eclipse |
|
References | () https://github.com/eclipse-ee4j/glassfish/pull/25106 - Exploit, Patch | |
References | () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 - Exploit, Vendor Advisory | |
CWE | CWE-601 | |
CPE | cpe:2.3:a:eclipse:glassfish:*:*:*:*:*:*:*:* |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-30 08:15
Updated : 2024-10-07 15:52
NVD link : CVE-2024-9329
Mitre link : CVE-2024-9329
CVE.ORG link : CVE-2024-9329
JSON object : View
Products Affected
eclipse
- glassfish