Directory Traversal Affecting org.apache.geronimo.plugins:console package, versions [,2.1.4)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.54% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEGERONIMOPLUGINS-6398775
  • published6 Mar 2024
  • disclosed17 Apr 2009
  • creditUnknown

Introduced: 17 Apr 2009

CVE-2008-5518  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade org.apache.geronimo.plugins:console to version 2.1.4 or higher.

Overview

org.apache.geronimo.plugins:console is a Geronimo administration console supporting dynamic extensions.

Affected versions of this package are vulnerable to Directory Traversal. Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

CVSS Scores

version 3.1