2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-45129" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2022-11-10T06:15:13.813" ,
"lastModified" : "2023-01-20T14:49:28.157" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Payara before 2022-11-04, when deployed to the root context, allows attackers to visit META-INF and WEB-INF, a different vulnerability than CVE-2022-37422. This affects Payara Platform Community before 4.1.2.191.38, 5.x before 5.2022.4, and 6.x before 6.2022.1, and Payara Platform Enterprise before 5.45.0."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Payara antes del 4 de noviembre de 2022, cuando se implementaba en el contexto root, permit\u00eda a los atacantes visitar META-INF y WEB-INF, una vulnerabilidad diferente a CVE-2022-37422. Esto afecta a Payara Platform Community antes de 4.1.2.191.38, 5.x antes de 5.2022.4 y 6.x antes de 6.2022.1, y a Payara Platform Enterprise antes de 5.45.0."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-552"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*" ,
"versionEndExcluding" : "4.1.2.191.38" ,
"matchCriteriaId" : "E3A4E671-807C-427F-99F9-8432AC4BF9AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:payara:payara:*:*:*:*:enterprise:*:*:*" ,
"versionEndExcluding" : "5.45.0" ,
"matchCriteriaId" : "166832EB-78AC-45D0-9CBC-6224B42F6377"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*" ,
"versionStartIncluding" : "5.0.0" ,
"versionEndExcluding" : "5.2022.4" ,
"matchCriteriaId" : "164CD4C9-D211-45C5-8B34-441A549C197C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*" ,
"versionStartIncluding" : "6.0.0" ,
"versionEndExcluding" : "6.2022.1" ,
"matchCriteriaId" : "13FD7C98-C2AC-44DE-BD23-0AB067E2AB0B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://seclists.org/fulldisclosure/2022/Nov/11" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://blog.payara.fish/whats-new-in-the-november-2022-payara-platform-release" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://docs.payara.fish/community/docs/6.2022.1/Release%20Notes/Release%20Notes%206.2022.1.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%205.2022.4.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%205.45.0.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://github.com/payara/Payara/commit/cccdfddeda71c78ae7b3179db5429e1bb8a56b2e" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
}
]
}