First published: Fri Jan 27 2017(Updated: )
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data as well as unauthorized read access to a subset of Oracle GlassFish Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GlassFish Server. CVSS v3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle GlassFish Enterprise Server | =2.1.1 | |
Oracle GlassFish Enterprise Server | =3.0.1 | |
Oracle GlassFish Enterprise Server | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3250 is classified as an easily exploitable vulnerability that allows unauthenticated attackers with network access to compromise the Oracle GlassFish Server.
To fix CVE-2017-3250, you should update the Oracle GlassFish Server to the latest supported version that is not affected by this vulnerability.
The affected versions of Oracle GlassFish Server are 2.1.1, 3.0.1, and 3.1.2.
Yes, CVE-2017-3250 can be exploited remotely by attackers using HTTP access.
No, an attacker does not need authentication to exploit CVE-2017-3250.