CVE-2024-10032
Description
In Eclipse GlassFish version 7.0.15 is possible to perform Stored Cross-site scripting attacks in the Administration Console.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Eclipse GlassFish 7.0.15 Administration Console allows stored XSS via crafted input, enabling session hijacking or admin impersonation.
Description
Eclipse GlassFish versions up to 7.0.15 contain a stored cross-site scripting (XSS) vulnerability in the Administration Console. [1] The vulnerability arises because user-supplied input is not properly sanitized before being stored and later rendered in the administrative interface. An attacker can inject arbitrary HTML or JavaScript code into configuration pages, such as standaloneInstanceConfigProperties.jsf. [3] [4]
Exploitation
To exploit this issue, an attacker must have valid administrator credentials for the GlassFish Administration Console. The attacker can then inject malicious script code into form fields that are later displayed to other administrators. The attack is performed via HTTP POST requests, and the injected payload is stored on the server. [1] No additional authentication is needed beyond the initial admin login.
Impact
If a victim administrator views the affected page, the injected script executes in their browser session. This can lead to session hijacking, exposure of sensitive data, or execution of administrative actions on behalf of the victim. [2] The stored XSS persists until manually removed, affecting all subsequent administrators who visit the compromised configuration page.
Mitigation
The vulnerability has been confirmed by the Eclipse Foundation. [2] [4] Users should upgrade to a patched version of Eclipse GlassFish as soon as one becomes available. As a temporary workaround, administrators should ensure that only trusted users have access to the Administration Console and review any unexpected content in configuration properties.
- GitHub - eclipse-ee4j/glassfish: Eclipse GlassFish
- NVD - CVE-2024-10032
- Glassfish cross-side scripting in standaloneInstanceConfigProperties.jsf (#228) · Issues · Eclipse Projects Security / vulnerability-reports · GitLab
- Glassfish cross-side scripting in standaloneInstanceConfigProperties.jsf (#42) · Issues · Eclipse Projects Security / cve-assignment · GitLab
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.glassfish.main.admingui:console-cluster-pluginMaven | <= 7.0.25 | — |
Affected products
2- Eclipse Foundation/Eclipse Glassfishv5Range: 7.0.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.