CVE-2024-10031
Description
In Eclipse GlassFish version 7.0.15 is possible to perform Stored Cross-site Scripting attacks by modifying the configuration file in the underlying operating system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Eclipse GlassFish 7.0.15 allows stored XSS via configuration file modification, enabling arbitrary script execution in the admin console.
Vulnerability
Overview
CVE-2024-10031 describes a stored cross-site scripting (XSS) vulnerability in Eclipse GlassFish version 7.0.15. The root cause is that an attacker with the ability to modify configuration files on the underlying operating system can inject malicious scripts into the application. These scripts are then stored and later executed in the context of the administrative console, leading to a stored XSS condition [1][2].
Exploitation
Prerequisites
Exploitation requires the attacker to have write access to the GlassFish configuration files on the server's file system. This could be achieved through local access, compromised credentials, or another vulnerability that grants file write privileges. No authentication to the GlassFish admin interface is needed for the injection step, but the injected script will execute when an administrator accesses the affected component (e.g., the user management interface) [3][4].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the admin console. This can lead to session hijacking, defacement, theft of administrative credentials, or further compromise of the GlassFish server and its hosted applications. The stored nature of the XSS means the payload persists across sessions and can affect multiple administrators [2].
Mitigation
Status
As of the publication date (2025-07-16), no patch has been announced for this vulnerability. Users are advised to restrict file system permissions on GlassFish configuration directories, monitor for unauthorized changes, and apply any future updates from the Eclipse GlassFish project [1]. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
- GitHub - eclipse-ee4j/glassfish: Eclipse GlassFish
- NVD - CVE-2024-10031
- Glasshfish cross-side scripting in auth-realm/admin-realm/list-users (#41) · Issues · Eclipse Projects Security / cve-assignment · GitLab
- Glasshfish cross-side scripting in auth-realm/admin-realm/list-users (#229) · Issues · Eclipse Projects Security / vulnerability-reports · GitLab
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.glassfish.main.admingui:console-commonMaven | <= 7.0.25 | — |
Affected products
2- Eclipse Foundation/Eclipse Glassfishv5Range: 7.0.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.