CVE-2024-9408
Description
In Eclipse GlassFish since version 6.2.5 it is possible to perform a Server Side Request Forgery attack in specific endpoints.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Eclipse GlassFish before 6.2.5+ contains a Server-Side Request Forgery (SSRF) vulnerability in specific endpoints, enabling internal network reconnaissance.
CVE-2024-9408 describes a Server-Side Request Forgery (SSRF) vulnerability in Eclipse GlassFish, affecting versions since 6.2.5. The vulnerability resides in specific endpoints that can be triggered without full administrative privileges, allowing a remote attacker to craft requests that cause the server to make unintended network calls.
Exploitation
An attacker can exploit this by sending a specially crafted HTTP request to the vulnerable endpoint. The attack requires no authentication beyond what is normally available to a user or potentially in an unauthenticated context, depending on the configuration of GlassFish. The attacker's request is forwarded by the server to internal resources, bypassing typical network access controls. The specific endpoints mentioned are documented in the security advisories referenced by the Eclipse Foundation [2][3][4].
Impact
Successfully exploiting this SSRF allows an attacker to scan internal networks from the GlassFish server's perspective, potentially accessing internal services, data, or other resources that are not exposed to the internet. This can lead to further compromise of the internal network.
Mitigation
The Eclipse Foundation has acknowledged the report [4]. Users should upgrade to a patched version of GlassFish beyond 6.2.5, monitor for official security patches, and consider applying network-level access controls to limit the server's outbound connections as a temporary workaround.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.glassfish.main.admingui:console-commonMaven | <= 6.2.5 | — |
Affected products
2- Eclipse Foundation/Eclipse Glassfishv5Range: 6.2.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.