2 results (0.004 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. • https://github.com/eclipse-ee4j/glassfish/pull/25106 https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232 • CWE-233: Improper Handling of Parameters •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Eclipse Glassfish versions prior to 7.0.10, a URL redirection vulnerability to untrusted sites existed. This vulnerability is caused by the vulnerability (CVE-2023-41080) in the Apache code included in GlassFish. This vulnerability only affects applications that are explicitly deployed to the root context ('/'). • https://github.com/eclipse-ee4j/glassfish/pull/24655 https://gitlab.eclipse.org/security/cve-assignement/-/issues/34 https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/163 https://glassfish.org/download • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •