CVE-2024-8215

8.4 HIGH

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Payara Server's Admin Console modules that allows attackers to inject malicious scripts into web pages. When exploited, it enables remote code inclusion, potentially compromising the server. Affected versions include Payara Server from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, and other specified ranges.

💻 Affected Systems

Products:
  • Payara Platform Payara Server
Versions: From 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Admin Console modules; other Payara Server components are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, unauthorized administrative access, and potential lateral movement within the network.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized administrative actions through the compromised Admin Console.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place, though the vulnerability would still exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Admin Console, which typically requires authentication, but could be combined with other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.68.0, 6.19.0, 6.2024.10, 4.1.2.191.51

Vendor Advisory: https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%206.2024.10.html

Restart Required: Yes

Instructions:

1. Download the patched version from Payara's official website. 2. Backup current configuration and deployments. 3. Stop the Payara Server. 4. Install the patched version. 5. Restore configurations and deployments. 6. Restart the server.

🔧 Temporary Workarounds

Disable Admin Console

all

Temporarily disable the Admin Console to prevent exploitation until patching is possible.

asadmin set configs.config.server-config.admin-service.property.adminConsoleEnabled=false

Restrict Admin Console Access

all

Limit access to the Admin Console using network controls or authentication mechanisms.

Configure firewall rules to restrict access to Admin Console port (typically 4848)

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all Admin Console inputs.
  • Use a web application firewall (WAF) with XSS protection rules enabled.

🔍 How to Verify

Check if Vulnerable:

Check the Payara Server version using the version command and compare against affected ranges.

Check Version:

asadmin version

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions listed in the fix.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Admin Console access patterns
  • Suspicious input strings in Admin Console logs

Network Indicators:

  • Unexpected requests to Admin Console endpoints with script-like payloads

SIEM Query:

source="payara-server" AND (url="*admin*" AND (payload="*<script>*" OR payload="*javascript:*"))

🔗 References

📤 Share & Export