[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-5518

Date: (C)2009-04-17   (M)2017-10-04 


Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

CVSS Score: 9.4Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 9.2Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: NONE





Reference:
http://www.securityfocus.com/archive/1/archive/1/502733/100/0/threaded
BID-34562
SECUNIA-34715
EXPLOIT-DB-8458
ADV-2009-1089
geronimo-dbmanager-directory-traversal(49899)
geronimo-keystores-directory-traversal(49900)
geronimo-repository-directory-traversal(49898)
http://dsecrg.com/pages/vul/show.php?id=118
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214
http://issues.apache.org/jira/browse/GERONIMO-4597

CPE    1
cpe:/a:apache:geronimo:2.1
CWE    1
CWE-22

© 2013 SecPod Technologies