CVE-2008-5518

Apache Geronimo Application Server <2.1.3 - Path Traversal

Title source: llm

Description

Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.

Exploits (1)

exploitdb WRITEUP VERIFIED
by DSecRG · textremotemultiple
https://www.exploit-db.com/exploits/8458

Scores

EPSS 0.1578
EPSS Percentile 94.6%

Classification

CWE
CWE-22
Status draft

Affected Products (5)

apache/geronimo
apache/geronimo
apache/geronimo
apache/geronimo
org.apache.geronimo.plugins/console < 2.1.4Maven

Timeline

Published Apr 17, 2009
Tracked Since Feb 18, 2026