[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97389

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-5518

Date: (C)2009-04-17   (M)2017-10-04
 
CVSS Score: 9.4Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 9.2Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: NONE











Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

Reference:
http://www.securityfocus.com/archive/1/archive/1/502733/100/0/threaded
BID-34562
SECUNIA-34715
EXPLOIT-DB-8458
ADV-2009-1089
geronimo-dbmanager-directory-traversal(49899)
geronimo-keystores-directory-traversal(49900)
geronimo-repository-directory-traversal(49898)
http://dsecrg.com/pages/vul/show.php?id=118
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214
http://issues.apache.org/jira/browse/GERONIMO-4597

CPE    1
cpe:/a:apache:geronimo:2.1
CWE    1
CWE-22

© 2013 SecPod Technologies