In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or < 7u201, or < 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Link | Tags |
---|---|
https://glassfish.org/docs/latest/security-guide.html#securing-glassfish-server | product |
https://gitlab.eclipse.org/security/cve-assignement/-/issues/14 | vendor advisory issue tracking |