CVE-2017-1000028 Scanner
CVE-2017-1000028 scanner - Directory Traversal vulnerability in Oracle GlassFish Server Open Source Edition
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 seconds
Time Interval
4 weeks
Scan only one
URL
Toolbox
-
Oracle GlassFish Server Open Source Edition is a widely used application server that is designed to run Java-based applications. It allows developers to deploy and manage their web applications and provides a range of features, such as high availability, clustering, and load balancing, to ensure that their applications are always up and running.
However, the security of the GlassFish Server was recently compromised when a vulnerability was discovered in its version 4.1. The CVE-2017-1000028 vulnerability can be exploited by sending a specially crafted HTTP GET request to the server, which can allow an attacker to perform directory traversal attacks and access files or directories outside of the root directory.
This vulnerability can have serious consequences for organizations that use GlassFish Server, as data privacy can be compromised and sensitive information can be exposed. Attackers can use this vulnerability to gain unauthorized access to critical files and steal sensitive data, or to launch further attacks on the server or network.
In conclusion, it is important for organizations that use GlassFish Server to be aware of the CVE-2017-1000028 vulnerability and take the necessary steps to protect against it. With the help of s4e.io, it is now easier than ever to stay informed about vulnerabilities in digital assets and take proactive measures to ensure that they remain secure.
REFERENCES