Security for everyone

CVE-2017-1000028 Scanner

Detects 'Directory Traversal' vulnerability in Oracle GlassFish Server Open Source Edition affects v. 4.1.

SCAN NOW

Short Info


Level

High

Type

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one

Url

Parent Category

CVE-2017-1000028 Scanner Detail

Oracle GlassFish Server Open Source Edition is a widely used application server that is designed to run Java-based applications. It allows developers to deploy and manage their web applications and provides a range of features, such as high availability, clustering, and load balancing, to ensure that their applications are always up and running.

However, the security of the GlassFish Server was recently compromised when a vulnerability was discovered in its version 4.1. The CVE-2017-1000028 vulnerability can be exploited by sending a specially crafted HTTP GET request to the server, which can allow an attacker to perform directory traversal attacks and access files or directories outside of the root directory.

This vulnerability can have serious consequences for organizations that use GlassFish Server, as data privacy can be compromised and sensitive information can be exposed. Attackers can use this vulnerability to gain unauthorized access to critical files and steal sensitive data, or to launch further attacks on the server or network.

In conclusion, it is important for organizations that use GlassFish Server to be aware of the CVE-2017-1000028 vulnerability and take the necessary steps to protect against it. With the help of securityforeveryone.com, it is now easier than ever to stay informed about vulnerabilities in digital assets and take proactive measures to ensure that they remain secure.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture