CVE-2008-6505: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
References
- issues.apache.org/struts/browse/WW-2779
- struts.apache.org/2.x/docs/s2-004.html
- github.com/advisories/GHSA-wv7g-xhvw-8hcp
- github.com/apache/struts/commit/04fcefa44bae1263c7cad6986a9dafed67f0164f
- github.com/apache/struts/commit/1f1c996eb1f0f3e2193fba0075f62ccd04e3c0c3
- nvd.nist.gov/vuln/detail/CVE-2008-6505
- web.archive.org/web/20081208214512/http://secunia.com/advisories/32497
- web.archive.org/web/20111025094319/http://www.securityfocus.com/bid/32104
Detect and mitigate CVE-2008-6505 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →