Oracle GlassFish Open Source Edition Demo Feature Default Password Lets Remote Users Access the Target System
|
SecurityTracker Alert ID: 1041292 |
SecurityTracker URL: http://securitytracker.com/id/1041292
|
CVE Reference:
CVE-2018-14324
(Links to External Site)
|
Date: Jul 16 2018
|
Impact:
User access via network
|
Vendor Confirmed: Yes
|
Version(s): Open Source Edition 5.0
|
Description:
A vulnerability was reported in Oracle GlassFish Open Source Edition. A remote user can gain access to the target system.
The demo feature uses a default password ('admin') for the admin account. A remote user can connect to TCP port 7676 and establish a JMX RMI session to gain access to the system.
[Editor's note: This applies to the open source edition, which is not an Oracle supported product.]
The original advisory is available at:
https://github.com/javaee/glassfish/issues/22500
0m0ker on github reported this vulnerability.
|
Impact:
A remote user can gain access to the target system.
|
Solution:
No solution was available at the time of this entry.
|
Vendor URL: javaee.github.io/glassfish/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: UNIX (Solaris - SunOS)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: Oracle GlassFish Open Source Edition
|
<item type="CAN" name="CVE-2018-14324" seq="2018-14324">
<status>Candidate</status>
<phase date="20180716">Assigned</phase>
<desc>The demo feature in Oracle GlassFish Open Source Edition 5.0 has TCP port 7676 open by default with a password of admin for the admin account. This allows remote attackers to obtain potentially sensitive information, perform database operations, or manipulate the demo via a JMX RMI session, aka a "jmx_rmi remote monitoring and control problem." NOTE: this is not an Oracle supported product.</desc>
<refs>
<ref source="MISC" url="https://github.com/javaee/glassfish/issues/22500">https://github.com/javaee/glassfish/issues/22500</ref>
</refs>
<votes>
</votes>
<comments>
</comments>
</item>
|
|