From 2a891736b1cea5536b10e54b670223be07769f7f Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 9 Jun 2022 12:52:41 -0400 Subject: [PATCH] Enhancement: cves/2017/CVE-2017-1000029.yaml by mp --- cves/2017/CVE-2017-1000029.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-1000029.yaml b/cves/2017/CVE-2017-1000029.yaml index de88a3a80b..b7d63c413b 100644 --- a/cves/2017/CVE-2017-1000029.yaml +++ b/cves/2017/CVE-2017-1000029.yaml @@ -1,14 +1,15 @@ id: CVE-2017-1000029 info: - name: GlassFish Server Open Source Edition 3.0.1 - LFI + name: Oracle GlassFish Server Open Source Edition 3.0.1 - Local File Inclusion author: 0x_Akoko severity: high - description: Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Local File Inclusion vulnerability, that makes it possible to include arbitrary files on the server, this vulnerability can be exploited without any prior authentication. + description: Oracle GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to unauthenticated local file inclusion vulnerabilities that allows remote attackers to include arbitrary files on the server in their requests. reference: - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18784 - https://www.cvedetails.com/cve/CVE-2017-1000029 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037 + - https://nvd.nist.gov/vuln/detail/CVE-2017-1000029 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 @@ -30,3 +31,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/06/09