CVE-2008-6508

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
igniterealtimeopenfire
𝑥
≤ 3.6.0a
igniterealtimeopenfire
2.6.0
igniterealtimeopenfire
2.6.1
igniterealtimeopenfire
2.6.2
igniterealtimeopenfire
3.0.0
igniterealtimeopenfire
3.0.1
igniterealtimeopenfire
3.1.0
igniterealtimeopenfire
3.1.1
igniterealtimeopenfire
3.2.0
igniterealtimeopenfire
3.2.1
igniterealtimeopenfire
3.2.2
igniterealtimeopenfire
3.2.3
igniterealtimeopenfire
3.2.4
igniterealtimeopenfire
3.3.0
igniterealtimeopenfire
3.3.2
igniterealtimeopenfire
3.3.3
igniterealtimeopenfire
3.4.0
igniterealtimeopenfire
3.4.1
igniterealtimeopenfire
3.4.3
igniterealtimeopenfire
3.4.4
igniterealtimeopenfire
3.4.5
igniterealtimeopenfire
3.5.0
igniterealtimeopenfire
3.5.1
igniterealtimeopenfire
3.5.2
igniterealtimeopenfire
3.6.0
𝑥
= Vulnerable software versions