7.2 High
AI Score
Confidence
Low
9.4 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:C/A:N
0.005 Low
EPSS
Percentile
77.2%
Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214
issues.apache.org/jira/browse/GERONIMO-4597
exchange.xforce.ibmcloud.com/vulnerabilities/49898
exchange.xforce.ibmcloud.com/vulnerabilities/49899
exchange.xforce.ibmcloud.com/vulnerabilities/49900
github.com/apache/geronimo
github.com/apache/geronimo/commit/aa0c2c26dde8930cad924796af7c17a13d236b16
nvd.nist.gov/vuln/detail/CVE-2008-5518
web.archive.org/web/20090419162753/secunia.com/advisories/34715
web.archive.org/web/20090422192030/dsecrg.com/pages/vul/show.php?id=118
web.archive.org/web/20200229223125/www.securityfocus.com/bid/34562
www.exploit-db.com/exploits/8458