CVE-2021-41381
📋 TL;DR
CVE-2021-41381 is a directory traversal vulnerability in Payara Micro Community that allows attackers to read arbitrary files on the server filesystem. This affects Payara Micro Community version 5.2021.6 and below. Organizations using these vulnerable versions are at risk of sensitive data exposure.
💻 Affected Systems
- Payara Micro Community
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through reading sensitive configuration files, credentials, or private keys leading to further system exploitation.
Likely Case
Unauthorized access to sensitive files containing application data, configuration details, or system information.
If Mitigated
Limited impact with proper file permissions and network segmentation preventing access to critical system files.
🎯 Exploit Status
Multiple public exploit scripts and proof-of-concepts are available, making exploitation trivial for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.2021.7 and above
Vendor Advisory: https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%205.2021.7.html
Restart Required: Yes
Instructions:
1. Download Payara Micro Community version 5.2021.7 or later from official Payara website. 2. Stop the current Payara Micro instance. 3. Replace with patched version. 4. Restart the application server.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allImplement WAF rules to block directory traversal patterns in HTTP requests
File Permission Restrictions
linuxRun Payara Micro with minimal file system permissions to limit accessible directories
chmod 750 /path/to/payara/data
chown payara:payara /path/to/payara
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Payara Micro instances from sensitive systems
- Deploy a reverse proxy with request filtering to block directory traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check Payara Micro version using the admin console or by examining server startup logs for version information
Check Version:
java -jar payara-micro.jar --version
Verify Fix Applied:
After patching, attempt directory traversal using known POC scripts to confirm they no longer work
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' patterns
- Unusual file access patterns in application logs
- Failed file access attempts outside expected directories
Network Indicators:
- HTTP requests with encoded directory traversal sequences
- Multiple failed file access attempts from single source
SIEM Query:
source="payara.log" AND ("../" OR "..\\" OR "%2e%2e%2f" OR "%252e%252e%252f")
🔗 References
- http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html
- http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
- http://seclists.org/fulldisclosure/2022/Nov/11
- https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC
- https://www.exploit-db.com/exploits/50371
- https://www.payara.fish
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt
- http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html
- http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
- http://seclists.org/fulldisclosure/2022/Nov/11
- https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC
- https://www.exploit-db.com/exploits/50371
- https://www.payara.fish
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt