CVE-2008-2751

Oracle Glassfish Server - XSS

Title source: rule

Description

Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf; the (5) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (6) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (7) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, (8) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiLookupProp:jndiLookup, or (9) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (b) resourceNode/externalResourceNew.jsf; the (10) propertyForm:propertySheet:propertSectionTextField:jndiProp:Jndi, (11) propertyForm:propertySheet:propertSectionTextField:nameProp:name, or (12) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (c) resourceNode/jmsDestinationNew.jsf; the (13) propertyForm:propertySheet:generalPropertySheet:jndiProp:Jndi or (14) propertyForm:propertySheet:generalPropertySheet:descProp:cd parameter to (d) resourceNode/jmsConnectionNew.jsf; the (15) propertyForm:propertySheet:propertSectionTextField:jndiProp:jnditext or (16) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (e) resourceNode/jdbcResourceNew.jsf; the (17) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:nameProp:name, (18) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:classNameProp:classname, or (19) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:loadOrderProp:loadOrder parameter to (f) applications/lifecycleModulesNew.jsf; or the (20) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:jndiProp:name, (21) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:resTypeProp:resType, or (22) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:dbProp:db parameter to (g) resourceNode/jdbcConnectionPoolNew1.jsf.

Exploits (7)

exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31928
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31927
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31925
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31924
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31922
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31926
exploitdb WORKING POC VERIFIED
by Eduardo Jorge · textremotemultiple
https://www.exploit-db.com/exploits/31923

Scores

EPSS 0.0065
EPSS Percentile 70.5%

Classification

CWE
CWE-79
Status draft

Affected Products (9)

oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
oracle/glassfish_server
sun/java_system_application_server

Timeline

Published Jun 18, 2008
Tracked Since Feb 18, 2026