First published: Mon Mar 23 2009(Updated: )
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfire | =3.2.2 | |
Openfire | <=3.6.0a | |
Openfire | =3.0.0 | |
Openfire | =3.0.1 | |
Openfire | =3.2.1 | |
Openfire | =3.4.4 | |
Openfire | =3.1.0 | |
Openfire | =3.4.0 | |
Openfire | =3.6.0 | |
Openfire | =3.2.3 | |
Openfire | =3.4.5 | |
Openfire | =3.3.2 | |
Openfire | =3.2.0 | |
Openfire | =3.5.0 | |
Openfire | =3.4.3 | |
Openfire | =2.6.1 | |
Openfire | =2.6.0 | |
Openfire | =2.6.2 | |
Openfire | =3.1.1 | |
Openfire | =3.5.2 | |
Openfire | =3.3.3 | |
Openfire | =3.5.1 | |
Openfire | =3.2.4 | |
Openfire | =3.3.0 | |
Openfire | =3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6508 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to the admin interface.
To fix CVE-2008-6508, upgrade your Openfire installation to version 3.6.1 or later where the vulnerability has been addressed.
CVE-2008-6508 affects Openfire versions 3.6.0a and earlier, including specific versions such as 3.2.2, 3.2.3, and 3.5.0.
Yes, CVE-2008-6508 can be exploited remotely, allowing attackers to bypass authentication and access sensitive admin functionality.
If you are running an affected version of Openfire, immediately upgrade to the fixed version to secure your environment against this vulnerability.