In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
{
"binaries": [
{
"binary_name": "glassfish-activation",
"binary_version": "1:2.1.1-b31g+dfsg1-3"
},
{
"binary_name": "glassfish-javaee",
"binary_version": "1:2.1.1-b31g+dfsg1-3"
},
{
"binary_name": "glassfish-jmac-api",
"binary_version": "1:2.1.1-b31g+dfsg1-3"
},
{
"binary_name": "glassfish-mail",
"binary_version": "1:2.1.1-b31g+dfsg1-3"
},
{
"binary_name": "glassfish-toplink-essentials",
"binary_version": "1:2.1.1-b31g+dfsg1-3"
}
]
}