First published: Tue Feb 10 2009(Updated: )
Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfire | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0497 is considered a critical vulnerability due to its potential for remote exploitation and unauthorized file access.
To fix CVE-2009-0497, upgrade to a patched version of Ignite Realtime Openfire that addresses this directory traversal vulnerability.
CVE-2009-0497 affects Ignite Realtime Openfire version 3.6.2.
CVE-2009-0497 allows remote attackers to exploit a directory traversal vulnerability by manipulating the log parameter to access arbitrary files.
The potential impacts of CVE-2009-0497 include unauthorized access to sensitive files on the server, which can lead to data breaches.