VYPR
Moderate severityNVD Advisory· Published Jul 16, 2025· Updated Jul 16, 2025

CVE-2024-9343

CVE-2024-9343

Description

In Eclipse GlassFish version 7.0.15 is possible to perform Stored Cross-site scripting attacks in the Administration Console.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Eclipse GlassFish 7.0.15 Admin Console stores unsanitized input, enabling stored Cross-site Scripting via uploadFrame.jsf.

Vulnerability

Analysis

A stored Cross-site Scripting (XSS) vulnerability exists in Eclipse GlassFish version 7.0.15, specifically within the Administration Console. The root cause is improper sanitization of user-controlled input that is later stored and rendered in a web page, allowing attacker-supplied JavaScript to execute in the context of an authenticated administrator's session [1][2].

Attack

Vector

The vulnerability is triggered through the uploadFrame.jsf component of the Admin Console. An authenticated attacker with administrative privileges can inject malicious script code when performing a file upload operation or entering data that is stored and later displayed without proper encoding. The attack requires valid administrator credentials and network access to the GlassFish Admin Console web interface [3][4].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the browser of any administrator who views the affected page. This can lead to session hijacking, credential theft, unauthorized administrative actions, or defacement of the console. Because the injected script is stored, it persists across sessions and can affect multiple administrators until the malicious content is removed [2][4].

Mitigation

Eclipse Foundation has assigned this issue for resolution; users are advised to upgrade to a patched version of GlassFish when released, or apply vendor-recommended workarounds such as restricting network access to the Admin Console and reviewing logs for signs of exploitation. No public patch was available at the time of publication [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.glassfish.main.admingui:console-commonMaven
<= 7.0.25

Affected products

2
  • Range: = 7.0.15
  • Eclipse Foundation/Eclipse Glassfishv5
    Range: 7.0.15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.