CVE-2008-6508

EUVD-2008-6475
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
igniterealtimeopenfire
𝑥
≤ 3.6.0a
igniterealtimeopenfire
2.6.0
igniterealtimeopenfire
2.6.1
igniterealtimeopenfire
2.6.2
igniterealtimeopenfire
3.0.0
igniterealtimeopenfire
3.0.1
igniterealtimeopenfire
3.1.0
igniterealtimeopenfire
3.1.1
igniterealtimeopenfire
3.2.0
igniterealtimeopenfire
3.2.1
igniterealtimeopenfire
3.2.2
igniterealtimeopenfire
3.2.3
igniterealtimeopenfire
3.2.4
igniterealtimeopenfire
3.3.0
igniterealtimeopenfire
3.3.2
igniterealtimeopenfire
3.3.3
igniterealtimeopenfire
3.4.0
igniterealtimeopenfire
3.4.1
igniterealtimeopenfire
3.4.3
igniterealtimeopenfire
3.4.4
igniterealtimeopenfire
3.4.5
igniterealtimeopenfire
3.5.0
igniterealtimeopenfire
3.5.1
igniterealtimeopenfire
3.5.2
igniterealtimeopenfire
3.6.0
𝑥
= Vulnerable software versions