CVE-2017-1000028

HIGH EXPLOITED NUCLEI

Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal

Title source: llm

Description

Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappswindows
https://www.exploit-db.com/exploits/45196
exploitdb WORKING POC VERIFIED
by Trustwave's SpiderLabs · textwebappsmultiple
https://www.exploit-db.com/exploits/39441
exploitdb WORKING POC
by Dhiraj Mishra · rubywebappslinux
https://www.exploit-db.com/exploits/45198
nomisec WORKING POC 1 stars
by NeonNOXX · infoleak
https://github.com/NeonNOXX/CVE-2017-1000028
metasploit WORKING POC
by Trustwave SpiderLabs, Dhiraj Mishra · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/glassfish_traversal.rb

Nuclei Templates (1)

Oracle GlassFish Server Open Source Edition 4.1 - Local File Inclusion
HIGHby pikpikcu,daffainfo
Shodan: cpe:"cpe:2.3:a:oracle:glassfish_server"

Scores

CVSS v3 7.5
EPSS 0.9412
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-12-12
CWE
CWE-22
Status published
Products (1)
oracle/glassfish_server 4.1
Published Jul 17, 2017
Tracked Since Feb 18, 2026