In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
{ "binaries": [ { "binary_name": "glassfish-activation", "binary_version": "1:2.1.1-b31g+dfsg1-3" }, { "binary_name": "glassfish-javaee", "binary_version": "1:2.1.1-b31g+dfsg1-3" }, { "binary_name": "glassfish-jmac-api", "binary_version": "1:2.1.1-b31g+dfsg1-3" }, { "binary_name": "glassfish-mail", "binary_version": "1:2.1.1-b31g+dfsg1-3" }, { "binary_name": "glassfish-toplink-essentials", "binary_version": "1:2.1.1-b31g+dfsg1-3" } ] }