Vulnerability Details : CVE-2008-6508
Public exploit exists!
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Vulnerability category: Directory traversal
Products affected by CVE-2008-6508
- cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-6508
68.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-6508
-
Openfire Admin Console Authentication Bypass
Disclosure Date: 2008-11-10First seen: 2020-04-26exploit/multi/http/openfire_auth_bypassThis module exploits an authentication bypass vulnerability in the administration console of Openfire servers. By using this vulnerability it is possible to upload/execute a malicious Openfire plugin on the server and execute arbitrary Java code. This module has be
CVSS scores for CVE-2008-6508
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-6508
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-6508
-
http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt
Exploit
-
http://www.igniterealtime.org/issues/browse/JM-1489
Patch;Vendor Advisory
-
http://www.andreas-kurtz.de/archives/63
-
http://www.securityfocus.com/archive/1/498162/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/3061
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46488
-
http://www.securityfocus.com/bid/32189
Openfire Multiple Input Validation VulnerabilitiesExploit
-
https://www.exploit-db.com/exploits/7075
Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting - JSP webapps Exploit
-
http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
Openfire ChangelogPatch;Vendor Advisory
Jump to