This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Igniterealtime First view 2009-05-11
Product Openfire Last view 2019-10-24
Version 3.6.3 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:igniterealtime:openfire

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2019-10-24 CVE-2019-18394

A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.

5.3 2019-10-24 CVE-2019-18393

PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.

6.1 2019-08-23 CVE-2019-15488

Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.

4.8 2017-10-26 CVE-2017-15911

The Admin Console in Ignite Realtime Openfire Server before 4.1.7 allows arbitrary client-side JavaScript code execution on victims who click a crafted setup/setup-host-settings.jsp?domain= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application.

7.5 2017-08-18 CVE-2014-3451

OpenFire XMPP Server before 3.10 accepts self-signed certificates, which allows remote attackers to perform unspecified spoofing attacks.

7.8 2014-04-10 CVE-2014-2741

nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

4 2009-05-11 CVE-2009-1596

Ignite Realtime Openfire before 3.6.5 does not properly implement the register.password (aka canChangePassword) console configuration setting, which allows remote authenticated users to bypass intended policy and change their own passwords via a passwd_change IQ packet.

4 2009-05-11 CVE-2009-1595

The jabber:iq:auth implementation in IQAuthHandler.java in Ignite Realtime Openfire before 3.6.4 allows remote authenticated users to change the passwords of arbitrary accounts via a modified username element in a passwd_change action.

CWE : Common Weakness Enumeration

%idName
28% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
14% (1) CWE-295 Certificate Issues
14% (1) CWE-287 Improper Authentication
14% (1) CWE-264 Permissions, Privileges, and Access Controls
14% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
14% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-57 Utilizing REST's Trust in the System Resource to Register Man in the Middle
CAPEC-94 Man in the Middle Attack
CAPEC-114 Authentication Abuse

Open Source Vulnerability Database (OSVDB)

id Description
57568 Openfire Crafted passwd_change IQ Packet register.password (canChangePassword...
54189 Openfire IQAuthHandler.java jabber:iq:auth Crafted passwd_change Request Arbi...

OpenVAS Exploits

id Description
2009-05-18 Name : Openfire Security Bypass Vulnerabilities
File : nvt/gb_openfire_sec_bypass_vuln_may09.nasl
2009-05-05 Name : FreeBSD Ports: openfire
File : nvt/freebsd_openfire2.nasl
2008-11-24 Name : FreeBSD Ports: openfire
File : nvt/freebsd_openfire0.nasl

Nessus® Vulnerability Scanner

id Description
2014-07-14 Name: The remote host contains an application that is affected by a denial of servi...
File: openfire_3_9_2.nasl - Type: ACT_GATHER_INFO
2014-07-01 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201406-35.nasl - Type: ACT_GATHER_INFO
2009-05-05 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_e3e30d9958a84a3f8059a8b7cd59b881.nasl - Type: ACT_GATHER_INFO
2009-05-05 Name: The remote host contains an application that is affected by a remote password...
File: openfire_3_6_4.nasl - Type: ACT_GATHER_INFO
2008-11-21 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_937adf01b64a11dda55e00163e000016.nasl - Type: ACT_GATHER_INFO