vendor:
Geronimo Application Server
by:
Digital Security Research Group [DSecRG]
7,5
CVSS
HIGH
Directory Traversal File Upload
22
CWE
Product Name: Geronimo Application Server
Affected Version From: 2.1
Affected Version To: 2.1.3
Patch Exists: YES
Related CWE: 2008-5518
CPE: a:apache:geronimo_application_server
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
DSECRG-09-018
A vulnerability was found in several portlets including Services/Repository, Embedded DB/DB Manager, and Security/Keystores when running on a Windows server. This issue may allow a remote attacker to upload any file in any directory.
Mitigation:
This security vulnerabilities fixed in Geronimo 2.1.4 release. An alternative workaround (if you choose to not upgrade to Apache Geronimo 2.1.4) is to disable the web console.