web-naming is vulnerable to denial of service via security manager bypass. The ResourceLinkFactory.setGlobalContext()
method was accessibly under a security manager without any checks. This allowed a malicious web application to injection a global context that could be used to disrupt other web applications or access data owned by other web applications. This issue is related to CVE-2016-0763
.
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.securityfocus.com/bid/101360
www.securitytracker.com/id/1039606
github.com/Payara/Payara/commit/cfe65208dc603e6bbab154ee1b086407d964d2b2
github.com/payara/Payara/pull/1210
www.sourceclear.com/blog/How-we-found-exploitable-zero-days-in-the-open-source-GlassFish-server-with-the-Security-Graph-Language/