Oracle GlassFish Server Administrative Console Authentication Bypass

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.


Synopsis :

The remote web server has an authentication bypass vulnerability.

Description :

The version of GlassFish Server running on the remote host has an
authentication bypass vulnerability. The server treats specially
crafted TRACE requests as if they are authenticated GET requests.

A remote, unauthenticated attacker could exploit this to bypass
authentication and gain administrative access to the affected
application. In turn, this could be leveraged to run commands under
the context of the GlassFish server, which is root by default.

See also :

http://www.nessus.org/u?5a8eecfb
http://www.securityfocus.com/archive/1/517965/30/0/threaded
http://www.securityfocus.com/archive/1/521120/30/0/threaded

Solution :

Upgrade to GlassFish Server 3.1 or later, or disable TRACE (refer to
the Core Security advisory for more information).

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 53876 ()

Bugtraq ID: 47818

CVE ID: CVE-2011-1511

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial