CVE-2023-28462
Published Mar 30, 2023
Last updated 2 years ago
Overview
- Description
- A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:payara:payara_server:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "E037FD25-7262-4915-8C15-E4F26AC2F118", "versionEndIncluding": "5.0.0", "versionStartIncluding": "4.1.2.191" }, { "criteria": "cpe:2.3:a:payara:payara_server:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "86C0FB40-9E93-4C1D-97B2-5B006BAAF92A", "versionStartIncluding": "5.20.0" }, { "criteria": "cpe:2.3:a:payara:payara_server:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "40196785-999A-417E-B959-0FE21CC75FD3", "versionStartIncluding": "5.2020.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7D8C0DB7-6178-4D70-B460-97A49F012560" } ], "operator": "OR" } ], "operator": "AND" } ]