[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-5518Date: (C)2009-04-17   (M)2018-02-19


Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.4
Exploit Score: 10.0
Impact Score: 9.2
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: NONE
  
Reference:
http://www.securityfocus.com/archive/1/archive/1/502733/100/0/threaded
BID-34562
SECUNIA-34715
EXPLOIT-DB-8458
ADV-2009-1089
geronimo-dbmanager-directory-traversal(49899)
geronimo-keystores-directory-traversal(49900)
geronimo-repository-directory-traversal(49898)
http://dsecrg.com/pages/vul/show.php?id=118
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214
http://issues.apache.org/jira/browse/GERONIMO-4597

CPE    1
cpe:/a:apache:geronimo:2.1
CWE    1
CWE-22

© SecPod Technologies