CVE-2009-0497 – Openfire 3.6.2 - 'log.jsp' Directory Traversal
https://notcve.org/view.php?id=CVE-2009-0497
Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter. Vulnerabilidad de salto de directorio en log.jsp en Ignite Realtime Openfire v3.6.2, permite a atacantes remotos leer ficheros de su elección a través de "..\" en el parámetro "log". • https://www.exploit-db.com/exploits/32680 http://secunia.com/advisories/33452 http://svn.igniterealtime.org/svn/repos/openfire/trunk/src/web/log.jsp http://www.coresecurity.com/content/openfire-multiple-vulnerabilities http://www.securityfocus.com/archive/1/499880/100/0/threaded http://www.securityfocus.com/bid/32945 https://bugs.gentoo.org/show_bug.cgi?id=257585 https://exchange.xforce.ibmcloud.com/vulnerabilities/47806 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •