Summary
Detail | |||
---|---|---|---|
Vendor | Sun | First view | 2004-12-31 |
Product | Java System Application Server | Last view | 2012-10-16 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2012-10-16 | CVE-2012-3155 | Unspecified vulnerability in the CORBA ORB component in Sun GlassFish Enterprise Server 2.1.1, Oracle GlassFish Server 3.0.1 and 3.1.2, and Sun Java System Application Server 8.1 and 8.2 allows remote attackers to affect availability, related to CORBA ORB. |
10 | 2011-04-19 | CVE-2011-0807 | Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration. |
4.3 | 2010-01-25 | CVE-2010-0386 | The default configuration of Sun Java System Application Server 7 and 7 2004Q2 enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398. |
5 | 2009-01-26 | CVE-2009-0278 | Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request. |
4.3 | 2008-11-28 | CVE-2008-5266 | Cross-site scripting (XSS) vulnerability in configuration/httpListenerEdit.jsf in the GlassFish 2 UR2 b04 webadmin interface in Sun Java System Application Server 9.1_01 build b09d-fcs and 9.1_02 build b04-fcs allows remote attackers to inject arbitrary web script or HTML via the name parameter, a different vector than CVE-2008-2751. |
4.3 | 2008-06-18 | CVE-2008-2751 | Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf; the (5) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (6) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (7) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, (8) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiLookupProp:jndiLookup, or (9) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (b) resourceNode/externalResourceNew.jsf; the (10) propertyForm:propertySheet:propertSectionTextField:jndiProp:Jndi, (11) propertyForm:propertySheet:propertSectionTextField:nameProp:name, or (12) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (c) resourceNode/jmsDestinationNew.jsf; the (13) propertyForm:propertySheet:generalPropertySheet:jndiProp:Jndi or (14) propertyForm:propertySheet:generalPropertySheet:descProp:cd parameter to (d) resourceNode/jmsConnectionNew.jsf; the (15) propertyForm:propertySheet:propertSectionTextField:jndiProp:jnditext or (16) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (e) resourceNode/jdbcResourceNew.jsf; the (17) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:nameProp:name, (18) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:classNameProp:classname, or (19) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:loadOrderProp:loadOrder parameter to (f) applications/lifecycleModulesNew.jsf; or the (20) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:jndiProp:name, (21) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:resTypeProp:resType, or (22) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:dbProp:db parameter to (g) resourceNode/jdbcConnectionPoolNew1.jsf. |
5 | 2008-05-09 | CVE-2008-2120 | Unspecified vulnerability in Sun Java System Application Server 7 2004Q2 before Update 6, Web Server 6.1 before SP8, and Web Server 7.0 before Update 1 allows remote attackers to obtain source code of JSP files via unknown vectors. |
6.8 | 2007-10-01 | CVE-2007-5153 | Unspecified vulnerability in Sun Java System Access Manager 7.1, when installed in a Sun Java System Application Server 8.x container, allows remote attackers to execute arbitrary code via unspecified vectors. |
7.5 | 2007-10-01 | CVE-2007-5152 | Sun Java System Access Manager 7.1, when installed in a Sun Java System Application Server 9.1 container, does not demand authentication after a container restart, which allows remote attackers to perform administrative tasks. |
5 | 2007-08-23 | CVE-2007-4511 | The Sun Admin Console in Sun Application Server 9.0_0.1 does not apply certain configuration changes persistently, which causes the (1) SSL and (2) SSL_MutualAuth ORB listener services to enable all protocols and ciphers after the services are restarted, possibly allowing remote attackers to bypass intended policy. |
4.3 | 2007-07-26 | CVE-2007-4025 | Unspecified vulnerability in Sun Java System (SJS) Application Server 8.1 through 9.0 before 20070724 on Windows allows remote attackers to obtain JSP source code via unspecified vectors. |
9.3 | 2007-07-11 | CVE-2007-3715 | Sun Java System Application Server and Web Server 7.0 through 9.0 before 20070710 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute an arbitrary Java method via a crafted stylesheet, a related issue to CVE-2007-3716. |
6.8 | 2006-12-04 | CVE-2006-6276 | HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors. |
4 | 2006-07-28 | CVE-2006-3921 | Sun Java System Application Server (SJSAS) 7 through 8.1 and Web Server (SJSWS) 6.0 and 6.1 allows remote authenticated users to read files outside of the "document root directory" via a direct request using a UTF-8 encoded URI. |
2.6 | 2006-06-26 | CVE-2006-3225 | Cross-site scripting (XSS) vulnerability in Sun ONE Application Server 7 before Update 9, Java System Application Server 7 2004Q2 before Update 5, and Java System Application Server Enterprise Edition 8.1 2005 Q1 allows remote attackers to inject arbitrary HTML or web script via unknown vectors. |
6.8 | 2006-05-19 | CVE-2006-2501 | Cross-site scripting (XSS) vulnerability in Sun ONE Web Server 6.0 SP9 and earlier, Java System Web Server 6.1 SP4 and earlier, Sun ONE Application Server 7 Platform and Standard Edition Update 6 and earlier, and Java System Application Server 7 2004Q2 Standard and Enterprise Edition Update 2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving error messages. |
5 | 2005-12-31 | CVE-2005-4805 | Unspecified vulnerability in Sun Java System Application Server 7 Standard and Platform Edition 6 and earlier, and 2004Q2 Standard and Platform Edition Update 2 and earlier, allows remote attackers to obtain the source code for Java Server pages (JSP) via unknown vectors. |
5 | 2005-12-31 | CVE-2005-4804 | Unspecified vulnerability in Sun Java System Application Server Platform Edition and Enterprise Edition 8.1 2005 Q1, and Platform Edition UR1, allows remote attackers to read .jar files via unknown vectors related to deployed web applications. |
4 | 2005-12-07 | CVE-2005-4046 | Unspecified vulnerability in Reverse SSL Proxy Plug-in for Sun Java System Application Server Standard Edition 7 2004Q2, Application Server Enterprise Edition 8.1 2005Q1, and Sun ONE Application Server 7 Standard Edition, as used in multiple web servers, allows remote attackers to conduct man-in-the-middle (MITM) attacks and "compromise data privacy." |
4.3 | 2005-05-02 | CVE-2005-0742 | Cross-site scripting (XSS) vulnerability in Sun Java System Application Server 7 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. |
5 | 2004-12-31 | CVE-2004-2216 | Unknown vulnerability in Sun Java System Web Server 6.0 SP7 and earlier and 6.1 SP1 and earlier, and Application Server 7 Update 4 and earlier, allows remote attackers to cause a denial of service (crash) via a malformed client certificate. |
7.5 | 2004-12-31 | CVE-2004-0826 | Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (2) | CWE-200 | Information Exposure |
22% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
11% (1) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
11% (1) | CWE-287 | Improper Authentication |
11% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
11% (1) | CWE-20 | Improper Input Validation |
11% (1) | CWE-16 | Configuration |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-47 | Buffer Overflow via Parameter Expansion |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71948 | Oracle Sun GlassFish Enterprise Server / Java System Application Server Craft... |
51604 | Sun Java System Application Server Multiple Directory Web Application Configu... |
46730 | GlassFish Application Server resourceNode/jdbcConnectionPoolNew1.jsf Multiple... |
46729 | GlassFish Application Server applications/lifecycleModulesNew.jsf Multiple Pa... |
46728 | GlassFish Application Server resourceNode/jdbcResourceNew.jsf Multiple Parame... |
46727 | GlassFish Application Server resourceNode/jmsConnectionNew.jsf Multiple Param... |
46726 | GlassFish Application Server resourceNode/jmsDestinationNew.jsf Multiple Para... |
46725 | GlassFish Application Server resourceNode/externalResourceNew.jsf Multiple Pa... |
46724 | GlassFish Application Server resourceNode/customResourceNew.jsf Multiple Para... |
46074 | GlassFish Administration Console for Sun Java System Application Server confi... |
45828 | Sun Application Server Admin Console ORB Listener Services Weak Cipher Persis... |
44948 | Sun Java System Web Server / Application Server Unspecified JSP Source Disclo... |
37758 | Sun Java System Access Manager Container Restart Authentication Bypass |
37757 | Sun Java System Access Manager Unspecified Remote Code Execution |
37250 | Sun Java System (SJS) Application Server on Windows Unspecified JSP Source Di... |
37248 | Sun Java System Web / Application Server Crafted XSLT Stylesheet Arbitrary Ja... |
31727 | Sun Java System Server Products HTTP Request Smuggling |
27587 | Sun Java System Application/Web Server Unspecified Arbitrary File Disclosure |
26792 | Sun Java System Application Server Unspecified XSS |
25634 | Sun ONE/Java System Web Server Error Page XSS |
21461 | Sun Java Reverse SSL Proxy Plug-in MITM Weakness |
19950 | Sun Java System Application Server Unspecified JSP Source Code Disclosure |
19391 | Sun Java System Application Server JAR File Content Disclosure |
15003 | Sun Java System Application Server Unspecified XSS |
11408 | Sun Java System Application Server HTTP TRACE Response XSS |
OpenVAS Exploits
id | Description |
---|---|
2012-10-25 | Name : Oracle GlassFish/Java System Application Server CORBA ORB Subcomponent DoS Vu... File : nvt/secpod_oracle_glassfish_n_sjas_corba_orb_comp_dos_vuln.nasl |
2011-04-22 | Name : Oracle GlassFish/System Application Server Security Bypass Vulnerability File : nvt/gb_oracle_glassfish_n_sjas_sec_bypass_vuln.nasl |
2010-02-08 | Name : Sun Java System Application Server Cross Site Tracing Vulnerability File : nvt/gb_sun_java_app_serv_xst_vuln.nasl |
2009-02-06 | Name : Sun Java System Application Server Information Disclosure vulnerability File : nvt/secpod_sun_java_app_serv_info_disc_vuln.nasl |
2008-09-04 | Name : FreeBSD Ports: nss File : nvt/freebsd_nss.nasl |
2005-11-03 | Name : NSS Library SSLv2 Challenge Overflow File : nvt/sslv2_hello_overflow.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2009-T-0009 | Sun Java System Application Server Information Disclosure Vulnerability Severity: Category II - VMSKEY: V0018273 |
2008-B-0045 | Multiple Sun Java System Application Server and Web Server Vulnerabilities Severity: Category II - VMSKEY: V0016025 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SSLv2 Client_Hello Challenge Length overflow attempt RuleID : 2656-community - Type : SERVER-WEBAPP - Revision : 22 |
2014-01-10 | SSLv2 Client_Hello Challenge Length overflow attempt RuleID : 2656 - Type : SERVER-WEBAPP - Revision : 22 |
2014-01-10 | Oracle GlassFish Server successful authentication bypass attempt RuleID : 20160 - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | Oracle GlassFish Server authentication bypass attempt RuleID : 20159 - Type : SERVER-WEBAPP - Revision : 9 |
2014-01-10 | Oracle GlassFish Server default credentials login attempt RuleID : 20158 - Type : SERVER-WEBAPP - Revision : 15 |
2014-01-10 | Oracle GlassFish Server war file upload attempt RuleID : 20157 - Type : SERVER-ORACLE - Revision : 10 |
2014-01-10 | SSLv1 Client_Hello Challenge Length overflow attempt RuleID : 15897 - Type : WEB-MISC - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-09-05 | Name: The remote host has an application server installed that is affected by a vul... File: sun_java_app_server_cve-2012-3155.nasl - Type: ACT_GATHER_INFO |
2014-09-05 | Name: The remote host has a web server installed that is affected by a vulnerabilit... File: glassfish_cve-2012-3155.nasl - Type: ACT_GATHER_INFO |
2013-07-18 | Name: The remote host has an application server installed that is affected by an in... File: sun_java_app_server_info_disclosure.nasl - Type: ACT_GATHER_INFO |
2011-08-17 | Name: The remote web server has an authentication bypass vulnerability that may per... File: glassfish_get_auth_bypass.nasl - Type: ACT_ATTACK |
2009-04-23 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_207f8ff3f69711d881b0000347a4fa7d.nasl - Type: ACT_GATHER_INFO |
2007-10-18 | Name: The remote host is missing Sun Security Patch number 124672-20 File: solaris8_124672.nasl - Type: ACT_GATHER_INFO |
2007-10-17 | Name: The remote host is missing Sun Security Patch number 124672-20 File: solaris10_124672.nasl - Type: ACT_GATHER_INFO |
2007-10-17 | Name: The remote host is missing Sun Security Patch number 124673-20 File: solaris10_x86_124673.nasl - Type: ACT_GATHER_INFO |
2007-10-17 | Name: The remote host is missing Sun Security Patch number 124673-20 File: solaris9_x86_124673.nasl - Type: ACT_GATHER_INFO |
2007-10-17 | Name: The remote host is missing Sun Security Patch number 124672-20 File: solaris9_124672.nasl - Type: ACT_GATHER_INFO |
2007-10-12 | Name: The remote host is missing Sun Security Patch number 125437-22 File: solaris10_125437.nasl - Type: ACT_GATHER_INFO |
2007-10-12 | Name: The remote host is missing Sun Security Patch number 125438-22 File: solaris9_x86_125438.nasl - Type: ACT_GATHER_INFO |
2007-10-12 | Name: The remote host is missing Sun Security Patch number 125437-22 File: solaris9_125437.nasl - Type: ACT_GATHER_INFO |
2007-10-12 | Name: The remote host is missing Sun Security Patch number 125437-22 File: solaris8_125437.nasl - Type: ACT_GATHER_INFO |
2007-10-12 | Name: The remote host is missing Sun Security Patch number 125438-22 File: solaris10_x86_125438.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 116648-25 File: solaris9_116648.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 119166-43 File: solaris9_119166.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 119166-43 File: solaris8_119166.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 119167-43 File: solaris9_x86_119167.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 116648-25 File: solaris8_116648.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 119166-43 File: solaris10_119166.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 116648-25 File: solaris10_116648.nasl - Type: ACT_GATHER_INFO |
2006-11-06 | Name: The remote host is missing Sun Security Patch number 119167-43 File: solaris10_x86_119167.nasl - Type: ACT_GATHER_INFO |
2004-08-24 | Name: The remote service is susceptible to a buffer overflow attack. File: sslv2_hello_overflow.nasl - Type: ACT_MIXED_ATTACK |
2003-01-23 | Name: Debugging functions are enabled on the remote web server. File: xst_http_trace.nasl - Type: ACT_GATHER_INFO |