Miggo Logo

CVE-2024-10029: Eclipse GlassFish is vulnerable to Reflected XSS attacks through its Administration Console

N/A

CVSS Score

Basic Information

EPSS Score
0.05045%
Published
7/16/2025
Updated
7/18/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.glassfish.main.admingui:console-commonmaven<= 7.0.25
org.glassfish.main.admingui:console-cluster-pluginmaven<= 7.0.25

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a reflected Cross-Site Scripting (XSS) in the Administration Console of Eclipse GlassFish, specifically on the instanceStatus.jsf page. The instanceName request parameter is not properly sanitized, allowing an attacker to inject malicious scripts. The vulnerability was reported for version 7.0.15 and the advisory states that versions up to 7.0.25 are affected. I have analyzed the vulnerability reports and searched the project's repository. However, I was unable to find the specific commit that addresses this vulnerability. Without the patch, it is not possible to identify the exact vulnerable function and the corresponding code changes. The vulnerable function would be within the JSF backing bean responsible for the instanceStatus.jsf page, which processes the instanceName parameter. Since I cannot pinpoint the exact function and provide evidence from the patch, I am returning an empty list of vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In **lips* *l*ss*is* v*rsion *.*.**, it is possi*l* to p*r*orm R**l**t** *ross-Sit* S*riptin* *tt**ks t*rou** t** **ministr*tion *onsol*.

Reasoning

T** vuln*r**ility is * r**l**t** *ross-Sit* S*riptin* (XSS) in t** **ministr*tion *onsol* o* **lips* *l*ss*is*, sp**i*i**lly on t** `inst*n**St*tus.js*` p***. T** `inst*n**N*m*` r*qu*st p*r*m*t*r is not prop*rly s*nitiz**, *llowin* *n *tt**k*r to inj