cve/2018/CVE-2018-3210.md

19 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3210)
![](https://img.shields.io/static/v1?label=Product&message=GlassFish%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%203.1.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GlassFish%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GlassFish%20Server%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
2024-06-09 00:33:16 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.