CVE-2008-5518

Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-04-17 14:30

Updated : 2024-02-04 17:33


NVD link : CVE-2008-5518

Mitre link : CVE-2008-5518

CVE.ORG link : CVE-2008-5518


JSON object : View

Products Affected

apache

  • geronimo

microsoft

  • windows
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')