Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0ybXc0LXdqOGMtN2Y5M84AA25-
Eclipse Glassfish remote code execution issue
In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or < 7u201, or < 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.
Permalink: https://github.com/advisories/GHSA-2mw4-wj8c-7f93JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0ybXc0LXdqOGMtN2Y5M84AA25-
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Percentage: 0.00164
EPSS Percentile: 0.5385
Identifiers: GHSA-2mw4-wj8c-7f93, CVE-2023-5763
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-5763
- https://gitlab.eclipse.org/security/cve-assignement/-/issues/14
- https://glassfish.org/docs/latest/security-guide.html#securing-glassfish-server
- https://github.com/advisories/GHSA-2mw4-wj8c-7f93
Affected Packages
maven:org.glassfish.main.orb:orb-connector
Dependent packages: 14Dependent repositories: 4
Downloads:
Affected Version Ranges: >= 5.0.0, < 7.0.0
Fixed in: 7.0.0
All affected versions: 5.1.0, 6.0.0, 6.1.0, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5
All unaffected versions: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.12, 7.0.13, 7.0.14, 7.0.15, 7.0.16, 7.0.17, 7.0.18, 7.0.19