** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/ | Exploit Third Party Advisory |
https://www.gruppotim.it/redteam | Third Party Advisory |
Configurations
History
01 Jul 2021, 19:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CPE | cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:* | |
References |
|
|
References | (MISC) https://n4nj0.github.io/advisories/oracle-glassfish-reflected-xss/ - Exploit, Third Party Advisory |
25 Jun 2021, 16:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-25 16:15
Updated : 2024-08-03 17:15
NVD link : CVE-2021-3314
Mitre link : CVE-2021-3314
CVE.ORG link : CVE-2021-3314
JSON object : View
Products Affected
oracle
- glassfish_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')