Oracle GlassFish Server 3.1.1 < Multiple Vulnerabilities (April 2012 CPU)

high Nessus Plugin ID 58846


The remote web server is affected by multiple vulnerabilities.


The version of GlassFish Server running on the remote host is affected by multiple vulnerabilities :

- A cross-site request forgery (CSRF) vulnerability in its REST interface. An authenticated user can be tricked into visiting a web page that leverages this vulnerability to upload an arbitrary WAR file to the GlassFish server, which is then executed with GlassFish's credentials. (CVE-2012-0550)

- A cross-site scripting (XSS) vulnerability in its administrative interface. This vulnerability permits JavaScript to be run in the context of the GlassFish administrative interface, which may result in the credentials of an authenticated user being stolen for use in subsequent attacks. (CVE-2012-0551)


Upgrade to GlassFish Server or later.

See Also

Plugin Details

Severity: High

ID: 58846

File Name: glassfish_cpu_apr_2012.nasl

Version: 1.13

Type: remote

Family: Web Servers

Published: 4/24/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.1


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:oracle:glassfish_server

Required KB Items: www/glassfish

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/23/2012

Vulnerability Publication Date: 4/17/2012

Reference Information

CVE: CVE-2012-0550, CVE-2012-0551

BID: 53118, 53136

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990