漏洞标题
HTTP服务器在头部值中错误接受不允许的字符
漏洞描述信息
Payara Platform Payara Server(Grizzly、REST Management Interface模块)和Payara Platform Payara Micro(Grizzly模块)中存在CRLF序列在HTTP头中的不当中和(HTTP请求/响应拆分)漏洞,允许操纵状态和身份冒充。此问题影响以下版本:
- Payara Server:从4.1.151到4.1.2.191.51,从5.20.0到5.70.0,从5.2020.2到5.2022.5,从6.2022.1到6.2024.12,从6.0.0到6.21.0;
- Payara Micro:从4.1.152到4.1.2.191.51,从5.20.0到5.70.0,从5.2020.2到5.2022.5,从6.2022.1到6.2024.12,从6.0.0到6.21.0。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
漏洞类别
输出中的特殊元素转义处理不恰当(注入)
漏洞标题
HTTP Server incorrectly accepting disallowed characters within header values
漏洞描述信息
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') vulnerability in Payara Platform Payara Server (Grizzly, REST Management Interface modules), Payara Platform Payara Micro (Grizzly modules) allows Manipulating State, Identity Spoofing.This issue affects Payara Server: from 4.1.151 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0; Payara Micro: from 4.1.152 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0.
CVSS信息
N/A
漏洞类别
HTTP头部中CRLF序列转义处理不恰当(HTTP响应分割)
漏洞标题
Payara Server和Payara Micro 注入漏洞
漏洞描述信息
Payara Server和Payara Micro都是英国Payara公司的产品。Payara Server是一个云原生、创新的开源中间件平台。Payara Micro是一个用于容器化 Jakarta EE (Java EE) 应用程序部署的开源轻量级中间件平台。 Payara Server和Payara Micro存在注入漏洞,该漏洞源于HTTP标头中存在CRLF序列中和不当漏洞,允许操纵状态和身份欺骗。
CVSS信息
N/A
漏洞类别
注入