First published: Thu Mar 30 2023(Updated: )
A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Payara Payara Server | >=4.1.2.191<=5.0.0 | |
Payara Payara Server | >=5.20.0 | |
Payara Payara Server | >=5.2020.1 | |
Oracle JDK 6 | =1.8.0-update181 | |
maven/fish.payara.server:payara-aggregator | >=5.2020.1<6.2022.1.Alpha3 | 6.2022.1.Alpha3 |
All of | ||
Any of | ||
Payara Payara Server | >=4.1.2.191<=5.0.0 | |
Payara Payara Server | >=5.20.0 | |
Payara Payara Server | >=5.2020.1 | |
Oracle JDK 6 | =1.8.0-update181 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28462 is a vulnerability in Payara Server where a JNDI rebind operation in the default ORB listener allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
The severity of CVE-2023-28462 is critical with a CVSS score of 9.8.
Payara Server versions 4.1.2.191 to 5.0.0 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community) are affected by CVE-2023-28462.
Remote attackers can exploit CVE-2023-28462 by performing a JNDI directory scan, which allows them to load malicious code on the server.
No, Oracle JDK version 1.8.0-update181 is not vulnerable to CVE-2023-28462.