Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xm92-rf24-h74w | Apache Geronimo Application Server multiple directory traversal vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:56:46.696Z
Reserved: 2008-12-12T00:00:00
Link: CVE-2008-5518
No data.
Status : Deferred
Published: 2009-04-17T14:30:00.500
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5518
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA