In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0320 | In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. |
Github GHSA |
GHSA-3g5w-6pw7-6hrp | Path Traversal In Eclipse GlassFish |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://bugs.eclipse.org/580502 |
|
History
Thu, 27 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-03-27T18:48:26.469Z
Reserved: 2022-08-08T00:00:00.000Z
Link: CVE-2022-2712
Updated: 2024-08-03T00:46:03.599Z
Status : Modified
Published: 2023-01-27T10:15:09.033
Modified: 2024-11-21T07:01:33.983
Link: CVE-2022-2712
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA