First published: Fri Jan 27 2023(Updated: )
In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse GlassFish | >=5.1.0<=6.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-2712.
The severity of CVE-2022-2712 is high with a score of 7.5.
Eclipse GlassFish versions 5.1.0 to 6.2.5 are affected by CVE-2022-2712.
CVE-2022-2712 allows a remote unauthenticated attacker to access critical data, such as configuration files and deployed applications.
To fix CVE-2022-2712, it is recommended to update to a version of Eclipse GlassFish that is not affected by the vulnerability.