CVE-2008-6508
23.03.2009, 20:00
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Vendor | Product | Version |
---|---|---|
igniterealtime | openfire | 𝑥 ≤ 3.6.0a |
igniterealtime | openfire | 2.6.0 |
igniterealtime | openfire | 2.6.1 |
igniterealtime | openfire | 2.6.2 |
igniterealtime | openfire | 3.0.0 |
igniterealtime | openfire | 3.0.1 |
igniterealtime | openfire | 3.1.0 |
igniterealtime | openfire | 3.1.1 |
igniterealtime | openfire | 3.2.0 |
igniterealtime | openfire | 3.2.1 |
igniterealtime | openfire | 3.2.2 |
igniterealtime | openfire | 3.2.3 |
igniterealtime | openfire | 3.2.4 |
igniterealtime | openfire | 3.3.0 |
igniterealtime | openfire | 3.3.2 |
igniterealtime | openfire | 3.3.3 |
igniterealtime | openfire | 3.4.0 |
igniterealtime | openfire | 3.4.1 |
igniterealtime | openfire | 3.4.3 |
igniterealtime | openfire | 3.4.4 |
igniterealtime | openfire | 3.4.5 |
igniterealtime | openfire | 3.5.0 |
igniterealtime | openfire | 3.5.1 |
igniterealtime | openfire | 3.5.2 |
igniterealtime | openfire | 3.6.0 |
𝑥
= Vulnerable software versions
References