Zero Trust Security in Enterprise Java: What it is and How to Implement it
Cybersecurity isn’t just about building walls, fortresses, moats or any other external barrier anymore. Nowadays, it’s important to check […]
This hot fix removes an arbitrary file read exploit that allows an attacker to read the content of any file on the server hosting the DAS. This exploit attacks the administration console with a specific string, bypassing secure administration and any required login details. Therefore, if the administration console is not publicly accessible, and Payara Server is running under a restricted user (as per best practice), then the risk is minimised.
Download Payara Server 161, including the fix.
################### WARNING ####################
For the hotfix to take effect, you will need to stop and start your DAS.
It is not necessary to restart your other instances, though specific setups may find it beneficial to do so.
################################################
This fix applies to all versions of Payara Server prior to version 4.1.1.161.
To apply the hotfix:
Restart your DAS: asadmin start-domain $DOMAIN_NAME
Share:
Cybersecurity isn’t just about building walls, fortresses, moats or any other external barrier anymore. Nowadays, it’s important to check […]
We’re excited to announce that Payara Platform Community 7 Beta application server is now fully certified as Jakarta EE 11 […]
Middleware runs quietly in the background of most applications, which makes it easy to overlook its lifecycle. In effect, […]