CVE-2023-28462: Payara Server allows remote attackers to load malicious code on the server once a JNDI directory scan is performed
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.79144%
CWE
Published
3/30/2023
Updated
2/18/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| fish.payara.server:payara-aggregator | maven | >= 5.2020.1, < 6.2022.1.Alpha3 | 6.2022.1.Alpha3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies the JNDI rebind operation in the default ORB listener as the attack vector. The CWE-502 (deserialization) and the dependency on outdated Java versions (pre-1.8u191) confirm the root cause: insecure JNDI operations combined with Java's historical support for remote class loading via LDAP/RMI. The ORB listener's lack of SSL/TLS enforcement or authentication in affected Payara versions makes the rebind operation exploitable. While the exact code location isn't provided in the advisory, the technical description and mitigation measures (securing/disabling ORB listeners) strongly implicate the JNDI rebind functionality in the ORB listener component.