Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.glassfish.main.admin/rest-service
  4. ›
  5. CVE-2024-9329

CVE-2024-9329: Eclipse Glassfish improperly handles http parameters

September 30, 2024 (updated October 7, 2024)

In Eclipse Glassfish versions before 7.0.17, the Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is /management/domain. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

References

  • github.com/advisories/GHSA-jq3f-mfmg-747x
  • github.com/eclipse-ee4j/glassfish
  • github.com/eclipse-ee4j/glassfish/commit/6ca35eee2ba90a8108984b27bec33f9cc50cd83b
  • github.com/eclipse-ee4j/glassfish/pull/25106
  • gitlab.eclipse.org/security/vulnerability-reports/-/issues/232
  • nvd.nist.gov/vuln/detail/CVE-2024-9329

Code Behaviors & Features

Detect and mitigate CVE-2024-9329 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 7.0.17

Fixed versions

  • 7.0.17

Solution

Upgrade to version 7.0.17 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-233: Improper Handling of Parameters
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

maven/org.glassfish.main.admin/rest-service/CVE-2024-9329.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:40 +0000.