CVE-2023-28462
Summary
| CVE | CVE-2023-28462 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-30 20:15:00 UTC |
| Updated | 2023-04-07 17:19:00 UTC |
| Description | A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Oracle | Jdk | 1.8.0 | update181 | All | All |
| Application | Payara | Payara Server | All | All | All | All |
| Application | Payara | Payara Server | All | All | All | All |
| Application | Payara | Payara Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerability Affecting Server Environments On Java 1.8 on Updates lower than 1.8u191 | MISC | blog.payara.fish | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.