In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
References
| Link | Resource |
|---|---|
| https://github.com/eclipse-ee4j/glassfish/pull/25106 | Exploit Patch |
| https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 | Exploit Vendor Advisory |
Configurations
History
07 Oct 2024, 15:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/eclipse-ee4j/glassfish/pull/25106 - Exploit, Patch | |
| References | () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 - Exploit, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Eclipse
Eclipse glassfish |
|
| CPE | cpe:2.3:a:eclipse:glassfish:*:*:*:*:*:*:*:* | |
| CWE | CWE-601 |
30 Sep 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-30 08:15
Updated : 2024-10-07 15:52
NVD link : CVE-2024-9329
Mitre link : CVE-2024-9329
JSON object : View
Products Affected
eclipse
- glassfish
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
