Vulnerability Details : CVE-2022-45129
Payara before 2022-11-04, when deployed to the root context, allows attackers to visit META-INF and WEB-INF, a different vulnerability than CVE-2022-37422. This affects Payara Platform Community before 4.1.2.191.38, 5.x before 5.2022.4, and 6.x before 6.2022.1, and Payara Platform Enterprise before 5.45.0.
Exploit prediction scoring system (EPSS) score for CVE-2022-45129
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 44 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-45129
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
[email protected] |
CWE ids for CVE-2022-45129
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: [email protected] (Primary)
References for CVE-2022-45129
-
https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%205.45.0.html
Release Notes;Vendor Advisory
-
https://blog.payara.fish/whats-new-in-the-november-2022-payara-platform-release
Release Notes;Vendor Advisory
-
https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%205.2022.4.html
Release Notes;Vendor Advisory
-
https://github.com/payara/Payara/commit/cccdfddeda71c78ae7b3179db5429e1bb8a56b2e
Patch;Third Party Advisory
-
http://seclists.org/fulldisclosure/2022/Nov/11
Mailing List;Third Party Advisory
-
https://docs.payara.fish/community/docs/6.2022.1/Release%20Notes/Release%20Notes%206.2022.1.html
Release Notes;Vendor Advisory
-
http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
Exploit;Third Party Advisory;VDB Entry
Products affected by CVE-2022-45129
- cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*
- cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*
- cpe:2.3:a:payara:payara:*:*:*:*:enterprise:*:*:*
- cpe:2.3:a:payara:payara:*:*:*:*:community:*:*:*