Apache Geronimo Application Server multiple directory traversal vulnerabilities
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Mar 6, 2024
Package
Affected versions
>= 2.1.0, < 2.1.4
Patched versions
2.1.4
Description
Published by the National Vulnerability Database
Apr 17, 2009
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Feb 26, 2024
Last updated
Mar 6, 2024
Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
References