First published: Mon Mar 23 2009(Updated: )
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | =2.0.9 | |
Apache Struts | =2.0.8 | |
Apache Struts | =2.0.11.1 | |
Apache Struts | =2.1.2_beta | |
Apache Struts | =2.0.11 | |
Apache Struts | =2.0.11.2 | |
Apache Struts | =2.0.6 | |
maven/org.apache.struts:struts2-core | >=2.1.0<2.1.3 | 2.1.3 |
maven/org.apache.struts:struts2-core | >=2.0.0<2.0.12 | 2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6505 is considered a critical vulnerability that allows remote attackers to exploit directory traversal and read arbitrary files.
To fix CVE-2008-6505, upgrade Apache Struts to version 2.0.12 or 2.1.3 or later.
CVE-2008-6505 affects Apache Struts versions 2.0.6 to 2.0.11.2 and all versions of 2.0.x prior to 2.0.12.
Yes, CVE-2008-6505 can be exploited remotely by attackers through crafted URIs.
Exploitation of CVE-2008-6505 may result in unauthorized file access on the server, potentially exposing sensitive information.