First published: Fri Apr 17 2009(Updated: )
Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geronimo | =2.1 | |
Apache Geronimo | =2.1.1 | |
Apache Geronimo | =2.1.2 | |
Apache Geronimo | =2.1.3 | |
Microsoft Windows | ||
maven/org.apache.geronimo.plugins:console | >=2.1.0<2.1.4 | 2.1.4 |
All of | ||
Any of | ||
Apache Geronimo | =2.1 | |
Apache Geronimo | =2.1.1 | |
Apache Geronimo | =2.1.2 | |
Apache Geronimo | =2.1.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.