Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A critical Remote Code Execution (RCE) vulnerability was identified in the server-side template rendering mechanism used by the Glassfish gadget handler. The application processes .xml files and evaluates user-supplied values within a context where Expression Language (EL) “expressions” are processed without proper sanitization or escaping. By injecting expressions such as #{7*7}, the server returns 49, confirming server-side EL evaluation. This issue allows a remote attacker to fully compromise the underlying host, enabling capabilities as reading/modifying data, executing arbitrary commands, persistence, and lateral movement.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Vulnerability Type
表达式语言语句中使用的特殊元素转义处理不恰当(表达式语言注入)
Vulnerability Title
Eclipse Glassfish 安全漏洞
Vulnerability Description
Eclipse Glassfish是Eclipse基金会的一个应用服务器。 Eclipse Glassfish存在安全漏洞,该漏洞源于服务器端模板渲染机制中表达式语言表达式处理不当,允许远程攻击者通过注入表达式完全破坏底层主机,实现读取或修改数据、执行任意命令、持久化和横向移动。
CVSS Information
N/A
Vulnerability Type
N/A