[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-5518Date: (C)2009-04-17   (M)2023-12-22


Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.4
Exploit Score: 10.0
Impact Score: 9.2
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: NONE
  
Reference:
http://www.securityfocus.com/archive/1/502733/100/0/threaded
BID-34562
SECUNIA-34715
EXPLOIT-DB-8458
ADV-2009-1089
geronimo-dbmanager-directory-traversal(49899)
geronimo-keystores-directory-traversal(49900)
geronimo-repository-directory-traversal(49898)
http://dsecrg.com/pages/vul/show.php?id=118
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214
http://issues.apache.org/jira/browse/GERONIMO-4597

CPE    2
cpe:/a:apache:geronimo:2.1
cpe:/o:microsoft:windows
CWE    1
CWE-22

© SecPod Technologies