First published: Mon Mar 05 2018(Updated: )
The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing files or their deletion. This issue was addressed in Apache ODE 1.3.3 which was released in 2009, however the incorrect name CVE-2008-2370 was used on the advisory by mistake.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache ODE | >1.1.1<=1.3.2 | |
Apache ODE | =1.0-incubating | |
Apache ODE | =1.0-rc1-incubating | |
Apache ODE | =1.0-rc2-incubating | |
Apache ODE | =1.0-rc3-incubating | |
Apache ODE | =1.0-rc4-incubating | |
Apache ODE | =1.1-rc1 | |
Apache ODE | =1.1-rc2 | |
Apache ODE | =1.1-rc3 | |
Apache ODE | =1.1-rc4 | |
Apache ODE | =1.1-rc5 | |
Apache ODE | =1.1.1-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.