In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://bugs.eclipse.org/580502 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-03T00:46:03.599Z
Reserved: 2022-08-08T00:00:00
Link: CVE-2022-2712

No data.

Status : Modified
Published: 2023-01-27T10:15:09.033
Modified: 2024-11-21T07:01:33.983
Link: CVE-2022-2712

No data.