We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7312

REST Interface Link Redirection via Host parameter



Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server (REST Management Interface modules) allows Session Hijacking.This issue affects Payara Server: from 6.0.0 before 6.18.0, from 6.2022.1 before 6.2024.9, from 5.2020.2 before 5.2022.5, from 5.20.0 before 5.67.0, from 4.1.2.191.0 before 4.1.2.191.50.

Reserved 2024-07-30 | Published 2024-09-11 | Updated 2024-09-11 | Assigner Payara


HIGH: 7.0CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:H/SA:H

Problem types

CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

Product status

Default status
unaffected

6.0.0 before 6.18.0
affected

6.2022.1 before 6.2024.9
affected

5.2020.2 before 5.2022.5
affected

5.20.0 before 5.67.0
affected

4.1.2.191.0 before 4.1.2.191.50
affected

Credits

Marco Ventura reporter

Claudia Bartolini reporter

Andrea Carlo Maria Dattola reporter

Debora Esposito reporter

Massimiliano Brolli reporter

References

docs.payara.fish/.../Release Notes/Release Notes 5.67.0.html release-notes

docs.payara.fish/.../Release Notes/Release Notes 6.18.0.html release-notes

cve.org (CVE-2024-7312)

nvd.nist.gov (CVE-2024-7312)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-7312

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.