CVE-2006-5750
Summary
| CVE | CVE-2006-5750 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-11-27 20:07:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager. |
Risk And Classification
Primary CVSS: v2.0 7.5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Jboss | Jboss Application Server | 3.2.5_final | All | All | All |
| Application | Jboss | Jboss Application Server | 3.2.6_final | All | All | All |
| Application | Jboss | Jboss Application Server | 3.2.7_final | All | All | All |
| Application | Jboss | Jboss Application Server | 3.2.8.sp1 | All | All | All |
| Application | Jboss | Jboss Application Server | 3.2.8_final | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.0_final | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.1_final | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.1_sp1 | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.2_final | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.3_final | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.4.ga | All | All | All |
| Application | Jboss | Jboss Application Server | 4.0.5.ga | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Patch |
| secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html | af854a3a-2127-422b-91ae-364da2661108 | secure-support.novell.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| JBoss Java Class DeploymentFileRepository Directory Traversal Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| JBoss DeploymentFileRepository Directory Traversal Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Novell Identity Manager JBoss Directory Traversal Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| www.osvdb.org/30767 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| HPSBST02318 SSRT080018 rev.1 - HP Storage Essentials Software, Remote Unauthorized Access to Data - c01390402 - Centro de Soporte HP para Empresas | af854a3a-2127-422b-91ae-364da2661108 | h20000.www2.hp.com | |
| SUSE Update for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| HP Storage Essentials Software Directory Traversal Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityTracker.com Archives - JBoss Application Server Error in DeploymentFileRepository Class Lets Remote Users Read and Write Files | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| [#JBAS-3861] DeploymentFileRepository can be used to write/remove arbitrary files in the filesystem - JBoss.org JIRA | af854a3a-2127-422b-91ae-364da2661108 | jira.jboss.com | |
| [#ASPATCH-126] JBAS-3861: DeploymentFileRepository can be used to write/remove arbitrary files in the filesystem - jboss.org JIRA | af854a3a-2127-422b-91ae-364da2661108 | jira.jboss.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.