Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Sun GlassFish Enterprise Server Vendors:   Oracle, Sun
Oracle GlassFish Open Source Edition Demo Feature Default Password Lets Remote Users Access the Target System
SecurityTracker Alert ID:  1041292
SecurityTracker URL:
CVE Reference:   CVE-2018-14324   (Links to External Site)
Date:  Jul 16 2018
Impact:   User access via network
Vendor Confirmed:  Yes  
Version(s): Open Source Edition 5.0
Description:   A vulnerability was reported in Oracle GlassFish Open Source Edition. A remote user can gain access to the target system.

The demo feature uses a default password ('admin') for the admin account. A remote user can connect to TCP port 7676 and establish a JMX RMI session to gain access to the system.

[Editor's note: This applies to the open source edition, which is not an Oracle supported product.]

The original advisory is available at:

0m0ker on github reported this vulnerability.

Impact:   A remote user can gain access to the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (Solaris - SunOS)

Message History:   None.

 Source Message Contents

Subject:  Oracle GlassFish Open Source Edition

<item type="CAN" name="CVE-2018-14324" seq="2018-14324">
<phase date="20180716">Assigned</phase>
<desc>The demo feature in Oracle GlassFish Open Source Edition 5.0 has TCP port 7676 open by default with a password of admin for the admin account. This allows remote attackers to obtain potentially sensitive information, perform database operations, or manipulate the demo via a JMX RMI session, aka a &quot;jmx_rmi remote monitoring and control problem.&quot; NOTE: this is not an Oracle supported product.</desc>
<ref source="MISC" url=""></ref>


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC