First published: Tue Nov 18 2008(Updated: )
Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Identity Manager | =6.0-sp2 | |
Sun Java System Identity Manager | =7.0 | |
Sun Java System Identity Manager | =6.0-sp1 | |
Sun Java System Identity Manager | =7.1 | |
Sun Java System Identity Manager | =6.0-sp3 | |
Sun Java System Identity Manager | =6.0-sp4 | |
Sun Java System Identity Manager | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5116 is considered a critical vulnerability as it allows remote attackers to read arbitrary files on the server.
To mitigate CVE-2008-5116, upgrade to a patched version of Sun Java System Identity Manager as recommended by the vendor.
CVE-2008-5116 affects versions 6.0 SP1 to SP4, and versions 7.0 and 7.1 of Sun Java System Identity Manager.
Yes, CVE-2008-5116 can be exploited remotely, allowing attackers to access sensitive files on the server.
Exploitation of CVE-2008-5116 can lead to unauthorized access to sensitive information stored in files on the server.