Vulnerabilites related to apache - geronimo
CVE-2010-1632 (GCVE-0-2010-1632)
Vulnerability from cvelistv5
Published
2010-06-22 20:24
Modified
2024-08-07 01:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://markmail.org/message/e4yiij7lfexastvl" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" }, { "name": "PM14844", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844" }, { "name": "ADV-2010-1528", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1528" }, { "name": "PM14765", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765" }, { "name": "ADV-2010-1531", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21433581" }, { "name": "PM14847", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984" }, { "name": "41025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/22x-security-report.html" }, { "name": "1036901", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036901" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/AXIS2-4450" }, { "name": "41016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41016" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf" }, { "name": "40279", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-5383" }, { "name": "40252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/21x-security-report.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-29T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://markmail.org/message/e4yiij7lfexastvl" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" }, { "name": "PM14844", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844" }, { "name": "ADV-2010-1528", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1528" }, { "name": "PM14765", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765" }, { "name": "ADV-2010-1531", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21433581" }, { "name": "PM14847", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984" }, { "name": "41025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/22x-security-report.html" }, { "name": "1036901", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036901" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/AXIS2-4450" }, { "name": "41016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41016" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf" }, { "name": "40279", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-5383" }, { "name": "40252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/21x-security-report.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1632", "datePublished": "2010-06-22T20:24:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:41.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0254 (GCVE-0-2006-0254)
Vulnerability from cvelistv5
Published
2006-01-18 02:00
Modified
2024-08-07 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:25:34.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "31493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31493" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.oliverkarow.de/research/geronimo_css.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create" }, { "name": "16260", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16260" }, { "name": "ADV-2006-0217", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0217" }, { "name": "geronimo-webaccesslog-viewer-xss(24159)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159" }, { "name": "geronimo-jspexamples-xss(24158)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158" }, { "name": "20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-1474" }, { "name": "18485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18485" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2008:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "31493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31493" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.oliverkarow.de/research/geronimo_css.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create" }, { "name": "16260", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16260" }, { "name": "ADV-2006-0217", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0217" }, { "name": "geronimo-webaccesslog-viewer-xss(24159)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159" }, { "name": "geronimo-jspexamples-xss(24158)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158" }, { "name": "20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded" }, { "name": "RHSA-2008:0261", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-1474" }, { "name": "18485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18485" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0630", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "name": "31493", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31493" }, { "name": "http://www.oliverkarow.de/research/geronimo_css.txt", "refsource": "MISC", "url": "http://www.oliverkarow.de/research/geronimo_css.txt" }, { "name": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create" }, { "name": "16260", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16260" }, { "name": "ADV-2006-0217", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0217" }, { "name": "geronimo-webaccesslog-viewer-xss(24159)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159" }, { "name": "geronimo-jspexamples-xss(24158)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158" }, { "name": "20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded" }, { "name": "RHSA-2008:0261", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "name": "http://issues.apache.org/jira/browse/GERONIMO-1474", "refsource": "MISC", "url": "http://issues.apache.org/jira/browse/GERONIMO-1474" }, { "name": "18485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18485" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0254", "datePublished": "2006-01-18T02:00:00", "dateReserved": "2006-01-18T00:00:00", "dateUpdated": "2024-08-07T16:25:34.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5518 (GCVE-0-2008-5518)
Vulnerability from cvelistv5
Published
2009-04-17 14:00
Modified
2024-08-07 10:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:56:46.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "geronimo-keystores-directory-traversal(49900)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49900" }, { "name": "geronimo-dbmanager-directory-traversal(49899)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49899" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34562" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34715" }, { "name": "geronimo-repository-directory-traversal(49898)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49898" }, { "name": "8458", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8458" }, { "name": "20090416 [DSECRG-09-018] Apache Geronimo - Directory Traversal vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502733/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dsecrg.com/pages/vul/show.php?id=118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "geronimo-keystores-directory-traversal(49900)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49900" }, { "name": "geronimo-dbmanager-directory-traversal(49899)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49899" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34562" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34715" }, { "name": "geronimo-repository-directory-traversal(49898)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49898" }, { "name": "8458", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8458" }, { "name": "20090416 [DSECRG-09-018] Apache Geronimo - Directory Traversal vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502733/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dsecrg.com/pages/vul/show.php?id=118" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-5518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "geronimo-keystores-directory-traversal(49900)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49900" }, { "name": "geronimo-dbmanager-directory-traversal(49899)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49899" }, { "name": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214", "refsource": "CONFIRM", "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34562" }, { "name": "http://issues.apache.org/jira/browse/GERONIMO-4597", "refsource": "CONFIRM", "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34715" }, { "name": "geronimo-repository-directory-traversal(49898)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49898" }, { "name": "8458", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8458" }, { "name": "20090416 [DSECRG-09-018] Apache Geronimo - Directory Traversal vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502733/100/0/threaded" }, { "name": "http://dsecrg.com/pages/vul/show.php?id=118", "refsource": "MISC", "url": "http://dsecrg.com/pages/vul/show.php?id=118" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-5518", "datePublished": "2009-04-17T14:00:00", "dateReserved": "2008-12-12T00:00:00", "dateUpdated": "2024-08-07T10:56:46.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4548 (GCVE-0-2007-4548)
Vulnerability from cvelistv5
Published
2007-08-27 23:00
Modified
2024-09-17 01:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3404" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html" }, { "name": "[dev] 20070813 Geronimo 2.0 Release suspended due to security issue found before release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-1201" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-08-27T23:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3404" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html" }, { "name": "[dev] 20070813 Geronimo 2.0 Release suspended due to security issue found before release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-1201" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/GERONIMO-3404", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/GERONIMO-3404" }, { "name": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html", "refsource": "CONFIRM", "url": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html" }, { "name": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html", "refsource": "MISC", "url": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html" }, { "name": "[dev] 20070813 Geronimo 2.0 Release suspended due to security issue found before release", "refsource": "MLIST", "url": "http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html" }, { "name": "https://issues.apache.org/jira/browse/GERONIMO-1201", "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/GERONIMO-1201" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4548", "datePublished": "2007-08-27T23:00:00Z", "dateReserved": "2007-08-27T00:00:00Z", "dateUpdated": "2024-09-17T01:50:41.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1777 (GCVE-0-2013-1777)
Vulnerability from cvelistv5
Published
2013-07-11 22:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:32.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-6477" }, { "name": "20130701 [SECURITY] CVE-2013-1777: Apache Geronimo 3 RMI classloader exposure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/30x-security-report.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-25T18:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-6477" }, { "name": "20130701 [SECURITY] CVE-2013-1777: Apache Geronimo 3 RMI classloader exposure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/30x-security-report.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1777", "datePublished": "2013-07-11T22:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:32.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5085 (GCVE-0-2007-5085)
Vulnerability from cvelistv5
Published
2007-09-26 10:00
Modified
2024-08-07 15:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:28.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25804", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25804" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html" }, { "name": "27464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27464" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586" }, { "name": "1018877", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018877" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3456" }, { "name": "26906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26906" }, { "name": "38661", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38661" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain \"access to Geronimo internals\" via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25804", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25804" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html" }, { "name": "27464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27464" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586" }, { "name": "1018877", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018877" }, { "tags": [ "x_refsource_MISC" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3456" }, { "name": "26906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26906" }, { "name": "38661", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38661" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain \"access to Geronimo internals\" via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25804", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25804" }, { "name": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html", "refsource": "CONFIRM", "url": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html" }, { "name": "27464", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27464" }, { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586" }, { "name": "1018877", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018877" }, { "name": "https://issues.apache.org/jira/browse/GERONIMO-3456", "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/GERONIMO-3456" }, { "name": "26906", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26906" }, { "name": "38661", "refsource": "OSVDB", "url": "http://osvdb.org/38661" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5085", "datePublished": "2007-09-26T10:00:00", "dateReserved": "2007-09-25T00:00:00", "dateUpdated": "2024-08-07T15:17:28.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0732 (GCVE-0-2008-0732)
Vulnerability from cvelistv5
Published
2008-02-12 20:00
Modified
2024-09-17 00:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:23.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-02-12T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0732", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0732", "datePublished": "2008-02-12T20:00:00Z", "dateReserved": "2008-02-12T00:00:00Z", "dateUpdated": "2024-09-17T00:20:57.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5797 (GCVE-0-2007-5797)
Vulnerability from cvelistv5
Published
2007-11-03 00:00
Modified
2024-08-07 15:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:46:59.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-3676", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3676" }, { "name": "38662", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105" }, { "name": "27482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27482" }, { "name": "26287", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26287" }, { "name": "27478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27478" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3543" }, { "name": "ADV-2007-3675", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3675" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-09T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-3676", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3676" }, { "name": "38662", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105" }, { "name": "27482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27482" }, { "name": "26287", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26287" }, { "name": "27478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27478" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3543" }, { "name": "ADV-2007-3675", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3675" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-3676", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3676" }, { "name": "38662", "refsource": "OSVDB", "url": "http://osvdb.org/38662" }, { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105" }, { "name": "27482", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27482" }, { "name": "26287", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26287" }, { "name": "27478", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27478" }, { "name": "https://issues.apache.org/jira/browse/GERONIMO-3543", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/GERONIMO-3543" }, { "name": "ADV-2007-3675", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3675" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5797", "datePublished": "2007-11-03T00:00:00", "dateReserved": "2007-11-02T00:00:00", "dateUpdated": "2024-08-07T15:46:59.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0038 (GCVE-0-2009-0038)
Vulnerability from cvelistv5
Published
2009-04-17 14:00
Modified
2024-08-07 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34562" }, { "name": "20090416 [DSECRG-09-019] Apache Geronimo - XSS vulnerabilities.txt", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34715" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dsecrg.com/pages/vul/show.php?id=119" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34562" }, { "name": "20090416 [DSECRG-09-019] Apache Geronimo - XSS vulnerabilities.txt", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34715" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dsecrg.com/pages/vul/show.php?id=119" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-0038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214", "refsource": "CONFIRM", "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34562" }, { "name": "20090416 [DSECRG-09-019] Apache Geronimo - XSS vulnerabilities.txt", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded" }, { "name": "http://issues.apache.org/jira/browse/GERONIMO-4597", "refsource": "CONFIRM", "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34715" }, { "name": "http://dsecrg.com/pages/vul/show.php?id=119", "refsource": "MISC", "url": "http://dsecrg.com/pages/vul/show.php?id=119" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-0038", "datePublished": "2009-04-17T14:00:00", "dateReserved": "2008-12-15T00:00:00", "dateUpdated": "2024-08-07T04:17:10.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5034 (GCVE-0-2011-5034)
Vulnerability from cvelistv5
Published
2011-12-30 01:00
Modified
2024-08-07 00:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "47412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47412" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "name": "[axis-java-dev] 20210622 [jira] [Updated] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210622 [jira] [Created] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210623 [jira] [Resolved] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Assigned] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Commented] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Created] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Comment Edited] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210726 [jira] [Resolved] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Created] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210728 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-28T11:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "47412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47412" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "name": "[axis-java-dev] 20210622 [jira] [Updated] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210622 [jira] [Created] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210623 [jira] [Resolved] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Assigned] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Commented] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Created] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Comment Edited] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210726 [jira] [Resolved] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Created] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210728 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py", "refsource": "MISC", "url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py" }, { "name": "http://www.nruns.com/_downloads/advisory28122011.pdf", "refsource": "MISC", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "47412", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47412" }, { "name": "VU#903934", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "name": "http://www.ocert.org/advisories/ocert-2011-003.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "name": "[axis-java-dev] 20210622 [jira] [Updated] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba@%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210622 [jira] [Created] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e@%3Cjava-dev.axis.apache.org%3E" }, { "name": "[axis-java-dev] 20210623 [jira] [Resolved] (AXIS2-6004) AXIS 2 1.7.9 geronimo jars with vulnerability CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d@%3Cjava-dev.axis.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Assigned] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1@%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Commented] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518@%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Created] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a@%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210723 [jira] [Comment Edited] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2@%3Cissues.karaf.apache.org%3E" }, { "name": "[karaf-issues] 20210726 [jira] [Resolved] (KARAF-7227) Upgrade geronimo artifacts to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c@%3Cissues.karaf.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Created] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7@%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210727 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e@%3Cdev.geronimo.apache.org%3E" }, { "name": "[geronimo-dev] 20210728 [jira] [Commented] (GERONIMO-6814) Improve Geronimo specs to mitigate CVE-2011-5034", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f@%3Cdev.geronimo.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5034", "datePublished": "2011-12-30T01:00:00", "dateReserved": "2011-12-29T00:00:00", "dateUpdated": "2024-08-07T00:23:39.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0039 (GCVE-0-2009-0039)
Vulnerability from cvelistv5
Published
2009-04-17 14:00
Modified
2024-08-07 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34562" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34715" }, { "name": "20090416 [DSECRG-09-020] Apache Geronimo - XSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502735/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dsecrg.com/pages/vul/show.php?id=120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34562" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34715" }, { "name": "20090416 [DSECRG-09-020] Apache Geronimo - XSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502735/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dsecrg.com/pages/vul/show.php?id=120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-0039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214", "refsource": "CONFIRM", "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "name": "ADV-2009-1089", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "name": "34562", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34562" }, { "name": "http://issues.apache.org/jira/browse/GERONIMO-4597", "refsource": "CONFIRM", "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "name": "34715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34715" }, { "name": "20090416 [DSECRG-09-020] Apache Geronimo - XSRF vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502735/100/0/threaded" }, { "name": "http://dsecrg.com/pages/vul/show.php?id=120", "refsource": "MISC", "url": "http://dsecrg.com/pages/vul/show.php?id=120" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-0039", "datePublished": "2009-04-17T14:00:00", "dateReserved": "2008-12-15T00:00:00", "dateUpdated": "2024-08-07T04:17:10.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-07-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html | ||
secalert@redhat.com | http://geronimo.apache.org/30x-security-report.html | Vendor Advisory | |
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21643282 | Patch, Vendor Advisory | |
secalert@redhat.com | https://issues.apache.org/jira/browse/GERONIMO-6477 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/30x-security-report.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21643282 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-6477 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "86DD5507-6CC0-4A15-A439-DACE3FF7CA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "70CA9733-1982-4F17-9491-88031934DC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:3.0:m1:*:*:*:*:*:*", "matchCriteriaId": "A5D93565-3338-4F68-987D-1E563F90A552", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:3.0.0.3:-:community:*:*:*:*:*", "matchCriteriaId": "24AF96DE-D8DE-497E-9413-256E8C9977E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object." }, { "lang": "es", "value": "La funcionalidad JMX Remoting en Apache Geronimo versiones 3.x anteriores a 3.0.1, tal y como se usa en WebSphere Application Server (WAS) Community Edition de IBM versi\u00f3n 3.0.0.3 y otros productos, no implementa apropiadamente el cargador de clases RMI, lo que permite a los atacantes remotos ejecutar c\u00f3digo arbitrario usando el conector JMX para enviar un objeto serializado dise\u00f1ado." } ], "id": "CVE-2013-1777", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-11T22:55:00.883", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://geronimo.apache.org/30x-security-report.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643282" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/GERONIMO-6477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://geronimo.apache.org/30x-security-report.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/GERONIMO-6477" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-03 00:46
Modified
2025-04-09 00:30
Severity ?
Summary
SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/38662 | ||
cve@mitre.org | http://secunia.com/advisories/27478 | ||
cve@mitre.org | http://secunia.com/advisories/27482 | Vendor Advisory | |
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?uid=swg21286105 | ||
cve@mitre.org | http://www.securityfocus.com/bid/26287 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3675 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3676 | ||
cve@mitre.org | https://issues.apache.org/jira/browse/GERONIMO-3543 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/38662 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27478 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27482 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg21286105 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26287 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3675 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3676 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-3543 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA6E27E4-BE63-4AE3-B29C-6BCF752FF608", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD68D814-2EA1-4E58-AAB1-3B23535A2D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "373ECB49-508C-446C-9CC9-6438D4D4137B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database." }, { "lang": "es", "value": "El SQLLoginModule en el Apache Geronimo 2.0 hasta el 2.1 no lanza una excepci\u00f3n para nombre de usuarios no existentes, lo que permite a atacantes remotos evitar la autenticaci\u00f3n mediante un intento de registrase con alg\u00fan usuario que no est\u00e9 contenido en la Base de Datos." } ], "id": "CVE-2007-5797", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-03T00:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/38662" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27478" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27482" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26287" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3675" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3676" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/jira/browse/GERONIMO-3543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21286105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/GERONIMO-3543" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect versions of geronimo-specs packages as shipped Red Hat Enterprise Linux 5, Red Hat Application Stack, Red Hat Application Server, Red Hat Directory Server and Red Hat Certificate System, as the geronimo-specs package only contains the specification of the Apache Geronimo Server\u2019s services and interfaces and not the vulnerable J2EE server classes.", "lastModified": "2007-11-06T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-12 21:00
Modified
2025-04-09 00:30
Severity ?
Summary
The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/28838 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28838 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
suse | suse_linux | * | |
apache | geronimo | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "67527281-81FA-4068-9E0A-7B19FB6A208A", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:*:*:*:*:*:*:*:*", "matchCriteriaId": "67517877-5475-4CDA-A634-4CDE447D41D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories." }, { "lang": "es", "value": "La secuencia de comandos init de Apache Geronimo sobre SUSE Linux sigue enlaces simb\u00f3licos cuando realiza una operaci\u00f3n de cambio en la propiedad de ficheros o directorios, que permite a usuarios locales obtener acceso a ficheros y directorios no especificados." } ], "id": "CVE-2008-0732", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-12T21:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-06-22 20:30
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html | ||
secalert@redhat.com | http://geronimo.apache.org/21x-security-report.html | ||
secalert@redhat.com | http://geronimo.apache.org/22x-security-report.html | ||
secalert@redhat.com | http://markmail.org/message/e4yiij7lfexastvl | ||
secalert@redhat.com | http://secunia.com/advisories/40252 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/40279 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/41016 | ||
secalert@redhat.com | http://secunia.com/advisories/41025 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21433581 | ||
secalert@redhat.com | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765 | ||
secalert@redhat.com | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844 | ||
secalert@redhat.com | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036901 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1528 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1531 | Vendor Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984 | ||
secalert@redhat.com | https://issues.apache.org/jira/browse/AXIS2-4450 | ||
secalert@redhat.com | https://issues.apache.org/jira/browse/GERONIMO-5383 | ||
secalert@redhat.com | https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/21x-security-report.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/22x-security-report.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://markmail.org/message/e4yiij7lfexastvl | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40252 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40279 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41016 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41025 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21433581 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036901 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1528 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1531 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/AXIS2-4450 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-5383 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | websphere_application_server | 7.0 | |
ibm | websphere_application_server | 7.0.0.1 | |
ibm | websphere_application_server | 7.0.0.2 | |
ibm | websphere_application_server | 7.0.0.3 | |
ibm | websphere_application_server | 7.0.0.4 | |
ibm | websphere_application_server | 7.0.0.5 | |
ibm | websphere_application_server | 7.0.0.6 | |
ibm | websphere_application_server | 7.0.0.7 | |
ibm | websphere_application_server | 7.0.0.8 | |
ibm | websphere_application_server | 7.0.0.9 | |
ibm | websphere_application_server | 7.0.0.10 | |
ibm | websphere_application_server | 7.0.0.11 | |
ibm | websphere_application_server | 7.0.0.12 | |
apache | axis2 | * | |
apache | axis2 | 1.3 | |
apache | axis2 | 1.4 | |
apache | axis2 | 1.4.1 | |
apache | axis2 | 1.5 | |
apache | axis2 | * | |
apache | axis2 | 1.3 | |
apache | axis2 | 1.4 | |
apache | axis2 | 1.4.1 | |
apache | axis2 | 1.5 | |
apache | geronimo | * | |
apache | axis2 | * | |
apache | axis2 | 1.3 | |
apache | axis2 | 1.4 | |
apache | axis2 | 1.4.1 | |
apache | axis2 | 1.5 | |
apache | orchestration_director_engine | * | |
apache | axis2 | * | |
apache | axis2 | 1.3 | |
apache | axis2 | 1.4 | |
apache | axis2 | 1.4.1 | |
apache | axis2 | 1.5 | |
apache | synapse | * | |
apache | axis2 | * | |
apache | axis2 | 1.3 | |
apache | axis2 | 1.4 | |
apache | axis2 | 1.4.1 | |
apache | axis2 | 1.5 | |
apache | tuscany | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0905C80-A1BA-49CD-90CA-9270ECC3940C", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B108457A-50DC-4432-9E30-98ADBEBF2389", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A8FC820-48D5-4850-82F7-8DA4A18EFF51", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0661F4A0-A520-4443-B19D-6885920ADFE5", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A553A6E7-64AA-41F2-9B92-4EC715C617B0", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9BFBDE57-3895-4841-B23C-06336A7016EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CF56870A-F9D3-4544-B63A-EFC2E82A1F7D", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "30B7A7B9-FCD1-4509-93CF-C5B736B04F4B", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "C93D1CE2-1772-44C0-A8CB-73E9AA1AF6B8", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "90BA0923-4064-49D3-82A2-EEFC4B0F9A9C", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "6289CCB4-9A13-4BB5-B44E-7CA936DD8421", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "833256BB-E2A6-4FE9-BE4F-982578023E43", "vulnerable": false }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "9631D69C-AFEC-4CFF-9190-3E5435EDCEC2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE048D6-C2D3-43F7-BA3C-E07FCFC00EAC", "versionEndIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBFD09-884C-436D-8D92-88B47A130C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0604FFE-16AC-4990-85F6-88C48A8E1707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D99CAA7-6580-4B1E-BDD7-0933F037B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC2371DC-0E86-49F2-98F6-4CCE49A24183", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE048D6-C2D3-43F7-BA3C-E07FCFC00EAC", "versionEndIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBFD09-884C-436D-8D92-88B47A130C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0604FFE-16AC-4990-85F6-88C48A8E1707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D99CAA7-6580-4B1E-BDD7-0933F037B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC2371DC-0E86-49F2-98F6-4CCE49A24183", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:*:*:*:*:*:*:*:*", "matchCriteriaId": "67517877-5475-4CDA-A634-4CDE447D41D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE048D6-C2D3-43F7-BA3C-E07FCFC00EAC", "versionEndIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBFD09-884C-436D-8D92-88B47A130C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0604FFE-16AC-4990-85F6-88C48A8E1707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D99CAA7-6580-4B1E-BDD7-0933F037B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC2371DC-0E86-49F2-98F6-4CCE49A24183", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:orchestration_director_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FD46A81-A6D2-4754-A605-B404CF458BA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE048D6-C2D3-43F7-BA3C-E07FCFC00EAC", "versionEndIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBFD09-884C-436D-8D92-88B47A130C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0604FFE-16AC-4990-85F6-88C48A8E1707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D99CAA7-6580-4B1E-BDD7-0933F037B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC2371DC-0E86-49F2-98F6-4CCE49A24183", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:synapse:*:*:*:*:*:*:*:*", "matchCriteriaId": "12E8E133-63B2-4B89-BCE9-2BE9DDB010EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEE048D6-C2D3-43F7-BA3C-E07FCFC00EAC", "versionEndIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CBFD09-884C-436D-8D92-88B47A130C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0604FFE-16AC-4990-85F6-88C48A8E1707", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D99CAA7-6580-4B1E-BDD7-0933F037B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC2371DC-0E86-49F2-98F6-4CCE49A24183", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tuscany:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C1D6C8-B442-4DD2-8988-4DC7A7FDC7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService." }, { "lang": "es", "value": "Apache Axis2 en versiones anteriores a la 1.5.2, tal como se usa en IBM WebSphere Application Server (WAS) 7.0 a 7.0.0.12, IBM Feature Pack para Web Services 6.1.0.9 a 6.1.0.32, IBM Feature Pack para Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo y otros productos, no rechaza de manera apropiada DTDs en mensajes SOAP, lo que permite a atacantes remotos leer ficheros de su elecci\u00f3n, enviar peticiones HTTP a servidores de la intranet o provocar una denegaci\u00f3n de servicio (consumo de memoria y de CPU) mediante un DTD manipulado, como se ha demostrado por una declaraci\u00f3n de entidad en una petici\u00f3n a Synapse SimpleStockQuoteService." } ], "id": "CVE-2010-1632", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-22T20:30:01.493", "references": [ { "source": "secalert@redhat.com", "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" }, { "source": "secalert@redhat.com", "url": "http://geronimo.apache.org/21x-security-report.html" }, { "source": "secalert@redhat.com", "url": "http://geronimo.apache.org/22x-security-report.html" }, { "source": "secalert@redhat.com", "url": "http://markmail.org/message/e4yiij7lfexastvl" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40252" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40279" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41016" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41025" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21433581" }, { "source": "secalert@redhat.com", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765" }, { "source": "secalert@redhat.com", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844" }, { "source": "secalert@redhat.com", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036901" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1528" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1531" }, { "source": "secalert@redhat.com", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/AXIS2-4450" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/GERONIMO-5383" }, { "source": "secalert@redhat.com", "url": "https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/21x-security-report.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/22x-security-report.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://markmail.org/message/e4yiij7lfexastvl" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21433581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/AXIS2-4450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/GERONIMO-5383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-18 01:51
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://issues.apache.org/jira/browse/GERONIMO-1474 | Exploit, Vendor Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2008-0630.html | ||
cve@mitre.org | http://secunia.com/advisories/18485 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31493 | ||
cve@mitre.org | http://www.oliverkarow.de/research/geronimo_css.txt | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0261.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/421996/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/16260 | Exploit | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0217 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24158 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24159 | ||
cve@mitre.org | https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create | ||
af854a3a-2127-422b-91ae-364da2661108 | http://issues.apache.org/jira/browse/GERONIMO-1474 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2008-0630.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18485 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31493 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oliverkarow.de/research/geronimo_css.txt | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0261.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/421996/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16260 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0217 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24158 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24159 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CCEA65AC-5A1B-4354-AB6C-E1525B060581", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer." } ], "id": "CVE-2006-0254", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-18T01:51:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-1474" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18485" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31493" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.oliverkarow.de/research/geronimo_css.txt" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16260" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0217" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-1474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.oliverkarow.de/research/geronimo_css.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/421996/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/16260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181\u0026styleName=Html\u0026projectId=10220\u0026Create=Create" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-30 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | ||
cve@mitre.org | http://secunia.com/advisories/47412 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/903934 | US Government Resource | |
cve@mitre.org | http://www.nruns.com/_downloads/advisory28122011.pdf | ||
cve@mitre.org | http://www.ocert.org/advisories/ocert-2011-003.html | ||
cve@mitre.org | https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py | ||
cve@mitre.org | https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/47412 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/903934 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nruns.com/_downloads/advisory28122011.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2011-003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | geronimo | * | |
apache | geronimo | 1.0 | |
apache | geronimo | 1.1 | |
apache | geronimo | 1.1.1 | |
apache | geronimo | 1.2 | |
apache | geronimo | 2.0.1 | |
apache | geronimo | 2.0.2 | |
apache | geronimo | 2.1 | |
apache | geronimo | 2.1.1 | |
apache | geronimo | 2.1.2 | |
apache | geronimo | 2.1.3 | |
apache | geronimo | 2.1.4 | |
apache | geronimo | 2.1.5 | |
apache | geronimo | 2.1.6 | |
apache | geronimo | 2.1.7 | |
apache | geronimo | 2.1.8 | |
apache | geronimo | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:*:*:*:*:*:*:*:*", "matchCriteriaId": "6207AE74-C9E0-4B40-9B7F-13F147E26ABB", "versionEndIncluding": "2.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CCEA65AC-5A1B-4354-AB6C-E1525B060581", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "531C2647-9F0D-4600-BB71-39BF2F3AC43F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7779AD5B-D75E-4B0C-AF85-32CA10E99BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3FE1FE3E-4DC7-4A94-A1F4-D814CC1F6B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD68D814-2EA1-4E58-AAB1-3B23535A2D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "373ECB49-508C-446C-9CC9-6438D4D4137B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7353F7C5-18E8-4310-B31E-9B13963E3F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "73F4CBB7-FF16-4B01-85B2-5B3FE7C8BE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "366DB1DC-39E2-43A1-9A23-37B7A75F7D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FEBE70E2-9AC5-443C-B33C-F8412DA886D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E551C272-F9B3-4FD3-BE98-0D4BB2E47B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "732915E8-2218-473D-AFE9-FFE3909EB83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "B93EFEDB-360E-48AD-B8AD-4497B6C5FAF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9CC5B8F5-8EAD-44AA-AE78-34EAE453455A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB97E59D-DA9F-48D3-8B30-4E0BAD75BBE2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461." }, { "lang": "es", "value": "Apache Geronimo v2.2.1 y anteriores calcula los valores hash de los par\u00e1metros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante el env\u00edo de gran cantidad de par\u00e1metros a mano. NOTA: este podr\u00eda superponerse CVE-2011-4461." } ], "id": "CVE-2011-5034", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-30T01:55:01.610", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/47412" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "cve@mitre.org", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "source": "cve@mitre.org", "url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/47412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3E" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-17 14:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://dsecrg.com/pages/vul/show.php?id=118 | Exploit | |
secalert@redhat.com | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Patch, Vendor Advisory | |
secalert@redhat.com | http://issues.apache.org/jira/browse/GERONIMO-4597 | Patch, Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/34715 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/502733/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/34562 | Exploit | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1089 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/49898 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/49899 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/49900 | ||
secalert@redhat.com | https://www.exploit-db.com/exploits/8458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dsecrg.com/pages/vul/show.php?id=118 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://issues.apache.org/jira/browse/GERONIMO-4597 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34715 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/502733/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34562 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1089 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49898 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49899 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49900 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/8458 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7353F7C5-18E8-4310-B31E-9B13963E3F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "73F4CBB7-FF16-4B01-85B2-5B3FE7C8BE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "366DB1DC-39E2-43A1-9A23-37B7A75F7D07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6) filename parameter to the createKeystore script in the Security/Keystores portlet." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en la consola de administraci\u00f3n web en Apache Geronimo Application Server 2.1 a 2.1.3 en Windows permiten a atacantes remotos subir ficheros a directorios de su elecci\u00f3n a trav\u00e9s de secuencias de salto de directorio en los par\u00e1metros 1) group, (2) artifact, (3) version, o (4) fileType para console/portal//Services/Repository (tambi\u00e9n conocido como el portlet Services/Repository); (5) el par\u00e1metro createDB para console/portal/Embedded DB/DB Manager (tambi\u00e9n conocido como el portlet Embedded DB/DB Manager); o el par\u00e1metro filename para el script createKeystore en el portlet Security/Keystores." } ], "id": "CVE-2008-5518", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-17T14:30:00.500", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://dsecrg.com/pages/vul/show.php?id=118" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/34715" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/502733/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49898" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49899" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49900" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/8458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://dsecrg.com/pages/vul/show.php?id=118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502733/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8458" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-09-26 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://geronimo.apache.org/2007/09/07/mejb-security-alert.html | ||
cve@mitre.org | http://osvdb.org/38661 | ||
cve@mitre.org | http://secunia.com/advisories/26906 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/27464 | ||
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?uid=swg21271586 | ||
cve@mitre.org | http://www.securityfocus.com/bid/25804 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018877 | ||
cve@mitre.org | https://issues.apache.org/jira/browse/GERONIMO-3456 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/2007/09/07/mejb-security-alert.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/38661 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26906 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27464 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg21271586 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25804 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018877 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-3456 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD68D814-2EA1-4E58-AAB1-3B23535A2D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain \"access to Geronimo internals\" via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el EJB de administraci\u00f3n (management EJB o MEJB) de Apache Geronimo anterior a 2.0.2 permite a atacantes remotos evitar la autenticaci\u00f3n y obtener \"acceso al interior de Geronimo\" a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2007-5085", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-26T10:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/38661" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26906" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27464" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25804" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018877" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/jira/browse/GERONIMO-3456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/2007/09/07/mejb-security-alert.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21271586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/GERONIMO-3456" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-17 14:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://dsecrg.com/pages/vul/show.php?id=119 | Exploit | |
secalert@redhat.com | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Patch, Vendor Advisory | |
secalert@redhat.com | http://issues.apache.org/jira/browse/GERONIMO-4597 | Patch | |
secalert@redhat.com | http://secunia.com/advisories/34715 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/502734/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/34562 | Exploit | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1089 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dsecrg.com/pages/vul/show.php?id=119 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://issues.apache.org/jira/browse/GERONIMO-4597 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34715 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/502734/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34562 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1089 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7353F7C5-18E8-4310-B31E-9B13963E3F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "73F4CBB7-FF16-4B01-85B2-5B3FE7C8BE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "366DB1DC-39E2-43A1-9A23-37B7A75F7D07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la consola de administraci\u00f3n web en Apache Geronimo Application Server 2.1 a 2.1.3 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante los par\u00e1metros (1) name, (2) ip, (3) username, o (4) description para console/portal/Server/Monitoring; o (5) el PATH_INFO para la URI por defecto bajo console/portal/." } ], "id": "CVE-2009-0038", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-17T14:30:00.530", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://dsecrg.com/pages/vul/show.php?id=119" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/34715" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://dsecrg.com/pages/vul/show.php?id=119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502734/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1089" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-27 23:17
Modified
2025-04-09 00:30
Severity ?
Summary
The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html | ||
cve@mitre.org | http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html | ||
cve@mitre.org | http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html | ||
cve@mitre.org | https://issues.apache.org/jira/browse/GERONIMO-1201 | ||
cve@mitre.org | https://issues.apache.org/jira/browse/GERONIMO-3404 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-1201 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/GERONIMO-3404 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA6E27E4-BE63-4AE3-B29C-6BCF752FF608", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module." }, { "lang": "es", "value": "El m\u00e9todo de entrada en las implementaciones LoginModule en Apache Geronimo 2.0 no pasa por FailedLoginException para las entradas fallidas, lo cual permite a atacantes remotos evitar los requisitios de validaci\u00f3n, utilizaci\u00f3n de m\u00f3dulos de su elecci\u00f3n, y conseguir acceso con privilegios administrativos a trav\u00e9s del env\u00edo de un nombre de usuario en blanco y contrase\u00f1as con el desplegador de l\u00ednea de comando en el m\u00f3dulo del despliegue." } ], "id": "CVE-2007-4548", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-27T23:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html" }, { "source": "cve@mitre.org", "url": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html" }, { "source": "cve@mitre.org", "url": "http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/jira/browse/GERONIMO-1201" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/GERONIMO-1201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/GERONIMO-3404" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-17 14:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://dsecrg.com/pages/vul/show.php?id=120 | ||
secalert@redhat.com | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Vendor Advisory | |
secalert@redhat.com | http://issues.apache.org/jira/browse/GERONIMO-4597 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/34715 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/502735/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/34562 | Exploit | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1089 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dsecrg.com/pages/vul/show.php?id=120 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://issues.apache.org/jira/browse/GERONIMO-4597 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34715 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/502735/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34562 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1089 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geronimo:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8E5A6-BCAA-428E-A703-6D1508AE2DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7353F7C5-18E8-4310-B31E-9B13963E3F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "73F4CBB7-FF16-4B01-85B2-5B3FE7C8BE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:geronimo:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "366DB1DC-39E2-43A1-9A23-37B7A75F7D07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en la consola de administraci\u00f3n web en Apache Geronimo Application Server 2.1 a 2.1.3 permite a atacantes remotos realizar acciones no autorizadas como administradores para peticiones que (1) cambian la contrase\u00f1a de administraci\u00f3n de la web, (2) suben aplicaciones y realizan otras acciones de administraci\u00f3n no especificadas como es demuestrado por (3) una petici\u00f3n de apagado a console/portal//Server/Shutdown." } ], "id": "CVE-2009-0039", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-17T14:30:00.547", "references": [ { "source": "secalert@redhat.com", "url": "http://dsecrg.com/pages/vul/show.php?id=120" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/34715" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/502735/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/1089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dsecrg.com/pages/vul/show.php?id=120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://issues.apache.org/jira/browse/GERONIMO-4597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502735/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1089" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }