This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Igniterealtime First view 2009-03-23
Product Openfire Last view 2019-10-24
Version 3.3.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:igniterealtime:openfire

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2019-10-24 CVE-2019-18394

A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.

5.3 2019-10-24 CVE-2019-18393

PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.

6.1 2019-08-23 CVE-2019-15488

Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.

4.8 2017-10-26 CVE-2017-15911

The Admin Console in Ignite Realtime Openfire Server before 4.1.7 allows arbitrary client-side JavaScript code execution on victims who click a crafted setup/setup-host-settings.jsp?domain= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application.

7.5 2017-08-18 CVE-2014-3451

OpenFire XMPP Server before 3.10 accepts self-signed certificates, which allows remote attackers to perform unspecified spoofing attacks.

7.8 2014-04-10 CVE-2014-2741

nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

4 2009-05-11 CVE-2009-1596

Ignite Realtime Openfire before 3.6.5 does not properly implement the register.password (aka canChangePassword) console configuration setting, which allows remote authenticated users to bypass intended policy and change their own passwords via a passwd_change IQ packet.

4 2009-05-11 CVE-2009-1595

The jabber:iq:auth implementation in IQAuthHandler.java in Ignite Realtime Openfire before 3.6.4 allows remote authenticated users to change the passwords of arbitrary accounts via a modified username element in a passwd_change action.

5.8 2009-03-23 CVE-2008-6511

Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.

4.3 2009-03-23 CVE-2008-6510

Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter.

7.5 2009-03-23 CVE-2008-6509

SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp.

7.5 2009-03-23 CVE-2008-6508

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.

CWE : Common Weakness Enumeration

%idName
27% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
18% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
9% (1) CWE-295 Certificate Issues
9% (1) CWE-287 Improper Authentication
9% (1) CWE-264 Permissions, Privileges, and Access Controls
9% (1) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
9% (1) CWE-20 Improper Input Validation
9% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-57 Utilizing REST's Trust in the System Resource to Register Man in the Middle
CAPEC-94 Man in the Middle Attack
CAPEC-114 Authentication Abuse

Open Source Vulnerability Database (OSVDB)

id Description
57568 Openfire Crafted passwd_change IQ Packet register.password (canChangePassword...
54189 Openfire IQAuthHandler.java jabber:iq:auth Crafted passwd_change Request Arbi...
52903 Openfire login.jsp url Parameter Arbitrary Site Redirect
52902 Openfire Admin Console login.jsp url Parameter XSS
51912 Openfire SIP Plugin CallLogDAO sipark-log-summary.jsp type Parameter SQL Inje...
49663 Openfire AuthCheck Filter URL Traversal Admin Authentication Bypass

ExploitDB Exploits

id Description
19432 Openfire <= 3.6.0a Admin Console Authentication Bypass

OpenVAS Exploits

id Description
2009-05-18 Name : Openfire Security Bypass Vulnerabilities
File : nvt/gb_openfire_sec_bypass_vuln_may09.nasl
2009-05-05 Name : FreeBSD Ports: openfire
File : nvt/freebsd_openfire2.nasl
2009-04-06 Name : Gentoo Security Advisory GLSA 200904-01 (openfire)
File : nvt/glsa_200904_01.nasl
2009-03-26 Name : Openfire Multiple Vulnerabilities (Mar09)
File : nvt/secpod_openfire_mult_vuln_mar09.nasl
2008-12-02 Name : Openfire 'AuthCheck Filter' Security Bypass Vulnerability
File : nvt/secpod_openfire_secbypass_900401.nasl
2008-11-24 Name : FreeBSD Ports: openfire
File : nvt/freebsd_openfire0.nasl

Snort® IPS/IDS

Date Description
2014-01-10 Jive Software Openfire Jabber Server injection attempt
RuleID : 16513 - Type : SQL - Revision : 4
2014-01-10 Jive Software Openfire Jabber Server SQL injection attempt
RuleID : 16450 - Type : SQL - Revision : 5
2014-01-10 Jive Software Openfire Jabber Server serverdown Authentication bypass attempt
RuleID : 15156 - Type : PUA-OTHER - Revision : 7
2014-01-10 Jive Software Openfire Jabber Server png Authentication bypass attempt
RuleID : 15155 - Type : PUA-OTHER - Revision : 8
2014-01-10 Jive Software Openfire Jabber Server gif Authentication bypass attempt
RuleID : 15154 - Type : PUA-OTHER - Revision : 8
2014-01-10 Jive Software Openfire Jabber Server setup Authentication bypass attempt
RuleID : 15153 - Type : PUA-OTHER - Revision : 10
2014-01-10 Jive Software Openfire Jabber Server setup-index Authentication bypass attempt
RuleID : 15152 - Type : PUA-OTHER - Revision : 7
2014-01-10 Jive Software Openfire Jabber Server logout Authentication bypass attempt
RuleID : 15151 - Type : PUA-OTHER - Revision : 7
2014-01-10 Jive Software Openfire Jabber Server login Authentication bypass attempt
RuleID : 15150 - Type : PUA-OTHER - Revision : 7

Nessus® Vulnerability Scanner

id Description
2014-07-14 Name: The remote host contains an application that is affected by a denial of servi...
File: openfire_3_9_2.nasl - Type: ACT_GATHER_INFO
2014-07-01 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201406-35.nasl - Type: ACT_GATHER_INFO
2009-05-05 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_e3e30d9958a84a3f8059a8b7cd59b881.nasl - Type: ACT_GATHER_INFO
2009-05-05 Name: The remote host contains an application that is affected by a remote password...
File: openfire_3_6_4.nasl - Type: ACT_GATHER_INFO
2009-04-03 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200904-01.nasl - Type: ACT_GATHER_INFO
2008-11-21 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_937adf01b64a11dda55e00163e000016.nasl - Type: ACT_GATHER_INFO
2008-11-09 Name: The remote web server contains an application that is affected by an authenti...
File: openfire_3_6_0a_auth_bypass.nasl - Type: ACT_ATTACK