Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h2pj-vj4x-w4fp

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

EPSS

Процентиль: 99%
0.77144
Высокий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 17 лет назад

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

EPSS

Процентиль: 99%
0.77144
Высокий

Дефекты

CWE-22