CVE-2008-6508

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:56

Type Values Removed Values Added
References () http://osvdb.org/49663 - Exploit () http://osvdb.org/49663 - Exploit
References () http://secunia.com/advisories/32478 - () http://secunia.com/advisories/32478 -
References () http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt - Exploit () http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt - Exploit
References () http://www.andreas-kurtz.de/archives/63 - () http://www.andreas-kurtz.de/archives/63 -
References () http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html - Patch, Vendor Advisory () http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html - Patch, Vendor Advisory
References () http://www.igniterealtime.org/issues/browse/JM-1489 - Patch, Vendor Advisory () http://www.igniterealtime.org/issues/browse/JM-1489 - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/498162/100/0/threaded - () http://www.securityfocus.com/archive/1/498162/100/0/threaded -
References () http://www.securityfocus.com/bid/32189 - Exploit () http://www.securityfocus.com/bid/32189 - Exploit
References () http://www.vupen.com/english/advisories/2008/3061 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/3061 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46488 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46488 -
References () https://www.exploit-db.com/exploits/7075 - () https://www.exploit-db.com/exploits/7075 -

Information

Published : 2009-03-23 20:00

Updated : 2024-11-21 00:56


NVD link : CVE-2008-6508

Mitre link : CVE-2008-6508

CVE.ORG link : CVE-2008-6508


JSON object : View

Products Affected

igniterealtime

  • openfire
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')