Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS14bTkyLXJmMjQtaDc0d84AAV0f

Apache Geronimo Application Server multiple directory traversal vulnerabilities

Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

Permalink: https://github.com/advisories/GHSA-xm92-rf24-h74w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14bTkyLXJmMjQtaDc0d84AAV0f
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 2 months ago


Identifiers: GHSA-xm92-rf24-h74w, CVE-2008-5518
References: Repository: https://github.com/apache/geronimo
Blast Radius: 1.0

Affected Packages

maven:org.apache.geronimo.plugins:console
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 2.1.0, < 2.1.4
Fixed in: 2.1.4
All affected versions: 2.1.1, 2.1.2, 2.1.3
All unaffected versions: 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.2.1, 3.0.0, 3.0.1