CVE-2017-1000028
HIGH EXPLOITED NUCLEIOracle GlassFish Server Open Source Edition 4.1 - Path Traversal
Title source: llmDescription
Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappswindows
https://www.exploit-db.com/exploits/45196
exploitdb
WORKING POC
VERIFIED
by Trustwave's SpiderLabs · textwebappsmultiple
https://www.exploit-db.com/exploits/39441
metasploit
WORKING POC
by Trustwave SpiderLabs, Dhiraj Mishra · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/glassfish_traversal.rb
Nuclei Templates (1)
Oracle GlassFish Server Open Source Edition 4.1 - Local File Inclusion
HIGHby pikpikcu,daffainfo
Shodan:
cpe:"cpe:2.3:a:oracle:glassfish_server"
References (3)
Scores
CVSS v3
7.5
EPSS
0.9412
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-12-12
CWE
CWE-22
Status
published
Products (1)
oracle/glassfish_server
4.1
Published
Jul 17, 2017
Tracked Since
Feb 18, 2026