{"api_version":"1","generated_at":"2026-04-24T17:07:18+00:00","cve":"CVE-2008-5116","urls":{"html":"https://cve.report/CVE-2008-5116","api":"https://cve.report/api/cve/CVE-2008-5116.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-5116","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-5116"},"summary":{"title":"CVE-2008-5116","description":"Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-11-18 00:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-22","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.vupen.com/english/advisories/2008/3128","name":"http://www.vupen.com/english/advisories/2008/3128","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/32262","name":"http://www.securityfocus.com/bid/32262","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Sun Java System Identity Manager Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.procheckup.com/Vulnerability_PR08-09.php","name":"http://www.procheckup.com/Vulnerability_PR08-09.php","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"404 - File or directory not found.","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/32606","name":"http://secunia.com/advisories/32606","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Sun Java System Identity Manager Multiple Vulnerabilities - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1021170","name":"http://www.securitytracker.com/id?1021170","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Sun Java System Identity Manager Bugs Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks and Disclose Files to Remote Users - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46554","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46554","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/498487/100/0/threaded","name":"http://www.securityfocus.com/archive/1/498487/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://osvdb.org/49767","name":"http://osvdb.org/49767","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-5116","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5116","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"6.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"6.0","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"6.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"6.0","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_system_identity_manager","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T10:40:17.144Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"243386","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1"},{"name":"32606","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/32606"},{"name":"sun-jsim-unspecified-security-bypass(46554)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46554"},{"name":"20081119 PR08-09: Unauthenticated File Retrieval on Sun Java System Identity Manager \"ext\" parameter","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/498487/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.procheckup.com/Vulnerability_PR08-09.php"},{"name":"32262","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/32262"},{"name":"ADV-2008-3128","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/3128"},{"name":"1021170","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1021170"},{"name":"49767","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/49767"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-11-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-11T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"243386","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1"},{"name":"32606","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/32606"},{"name":"sun-jsim-unspecified-security-bypass(46554)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46554"},{"name":"20081119 PR08-09: Unauthenticated File Retrieval on Sun Java System Identity Manager \"ext\" parameter","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/498487/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.procheckup.com/Vulnerability_PR08-09.php"},{"name":"32262","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/32262"},{"name":"ADV-2008-3128","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/3128"},{"name":"1021170","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1021170"},{"name":"49767","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/49767"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-5116","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"243386","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243386-1"},{"name":"32606","refsource":"SECUNIA","url":"http://secunia.com/advisories/32606"},{"name":"sun-jsim-unspecified-security-bypass(46554)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46554"},{"name":"20081119 PR08-09: Unauthenticated File Retrieval on Sun Java System Identity Manager \"ext\" parameter","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/498487/100/0/threaded"},{"name":"http://www.procheckup.com/Vulnerability_PR08-09.php","refsource":"MISC","url":"http://www.procheckup.com/Vulnerability_PR08-09.php"},{"name":"32262","refsource":"BID","url":"http://www.securityfocus.com/bid/32262"},{"name":"ADV-2008-3128","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/3128"},{"name":"1021170","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1021170"},{"name":"49767","refsource":"OSVDB","url":"http://osvdb.org/49767"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-5116","datePublished":"2008-11-18T00:00:00.000Z","dateReserved":"2008-11-17T00:00:00.000Z","dateUpdated":"2024-08-07T10:40:17.144Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-11-18 00:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-22","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:6.0:*:*:*:*:*:*:*","matchCriteriaId":"13445915-DF3D-4C52-B1DC-9FC6BE0DD519"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:6.0:sp1:*:*:*:*:*:*","matchCriteriaId":"D0C2964C-7435-4999-AF16-01CD9EF5782C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:6.0:sp2:*:*:*:*:*:*","matchCriteriaId":"51CFF484-5A52-41DC-A003-A9319DF2AFB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:6.0:sp3:*:*:*:*:*:*","matchCriteriaId":"9A7E88DA-F3A8-4B0F-AD4F-8680C1FB3282"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:6.0:sp4:*:*:*:*:*:*","matchCriteriaId":"861DEDA3-93A1-405A-BA2F-764AE4219D89"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:7.0:*:*:*:*:*:*:*","matchCriteriaId":"0980492E-B7DB-4B9F-A400-FDC47DB89A95"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_system_identity_manager:7.1:*:*:*:*:*:*:*","matchCriteriaId":"3A5C87C0-3734-4568-97A6-6AB8979AABE7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"5116","Ordinal":"1","Title":"CVE-2008-5116","CVE":"CVE-2008-5116","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"5116","Ordinal":"1","NoteData":"Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter.","Type":"Description","Title":"CVE-2008-5116"},{"CveYear":"2008","CveId":"5116","Ordinal":"2","NoteData":"2008-11-17","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"5116","Ordinal":"3","NoteData":"2018-10-11","Type":"Other","Title":"Modified"}]}}}