Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-6508

Опубликовано: 23 мар. 2009
Источник: nvd
CVSS2: 7.5
EPSS Высокий

Описание

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
Версия до 3.6.0a (включая)
cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.77144
Высокий

7.5 High

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

EPSS

Процентиль: 99%
0.77144
Высокий

7.5 High

CVSS2

Дефекты

CWE-22