CVE-2008-6508

critical

Description

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

References

https://www.exploit-db.com/exploits/7075

https://exchange.xforce.ibmcloud.com/vulnerabilities/46488

http://www.vupen.com/english/advisories/2008/3061

http://www.securityfocus.com/archive/1/498162/100/0/threaded

http://www.igniterealtime.org/issues/browse/JM-1489

http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html

http://www.andreas-kurtz.de/archives/63

http://secunia.com/advisories/32478

Details

Source: Mitre, NVD

Published: 2009-03-23

Updated: 2018-10-11

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical