CVE-2008-6505 : Detail

CVE-2008-6505

Directory Traversal
A01-Broken Access Control
96.5%V3
Network
2009-03-23
13h00 +00:00
2009-08-19
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 32565

Publication date : 2008-11-03 23h00 +00:00
Author : Csaba Barta
EDB Verified : Yes

source: https://www.securityfocus.com/bid/32104/info Struts is prone to multiple directory-traversal vulnerabilities because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the webserver process. Information obtained may aid in further attacks. Versions prior to Struts 2.0.12 are vulnerable. http://www.example.com:8080/struts2-blank-2.0.11.1/struts.. http://www.example.com:8080/struts2-blank-2.0.11.1/struts/..%252f http://www.example.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Log\in.class/

Products Mentioned

Configuraton 0

Apache>>Struts >> Version 2.0.6

Apache>>Struts >> Version 2.0.8

Apache>>Struts >> Version 2.0.9

Apache>>Struts >> Version 2.0.11

Apache>>Struts >> Version 2.0.11.1

Apache>>Struts >> Version 2.0.11.2

Apache>>Struts >> Version 2.1.2_beta

    References

    http://www.vupen.com/english/advisories/2008/3003
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/32497
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.securityfocus.com/bid/32104
    Tags : vdb-entry, x_refsource_BID
    http://osvdb.org/49733
    Tags : vdb-entry, x_refsource_OSVDB
    http://osvdb.org/49734
    Tags : vdb-entry, x_refsource_OSVDB