CVE-2008-6508
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
23/03/2009
Last modified:
09/04/2025
Description
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* | 3.6.0a (including) | |
cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/49663
- http://secunia.com/advisories/32478
- http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt
- http://www.andreas-kurtz.de/archives/63
- http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
- http://www.igniterealtime.org/issues/browse/JM-1489
- http://www.securityfocus.com/archive/1/498162/100/0/threaded
- http://www.securityfocus.com/bid/32189
- http://www.vupen.com/english/advisories/2008/3061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46488
- https://www.exploit-db.com/exploits/7075
- http://osvdb.org/49663
- http://secunia.com/advisories/32478
- http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt
- http://www.andreas-kurtz.de/archives/63
- http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
- http://www.igniterealtime.org/issues/browse/JM-1489
- http://www.securityfocus.com/archive/1/498162/100/0/threaded
- http://www.securityfocus.com/bid/32189
- http://www.vupen.com/english/advisories/2008/3061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46488
- https://www.exploit-db.com/exploits/7075