Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-0496 | First vendor Publication | 2009-02-09 |
Vendor | Cve | Last vendor Modification | 2018-10-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-06 | Name : Gentoo Security Advisory GLSA 200904-01 (openfire) File : nvt/glsa_200904_01.nasl |
2009-02-11 | Name : Ignite Realtime OpenFire Multiple Vulnerabilities File : nvt/gb_openfire_mult_vuln.nasl |
2009-01-26 | Name : FreeBSD Ports: openfire File : nvt/freebsd_openfire1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
51425 | Openfire muc-room-edit-form.jsp Multiple Parameter XSS |
51424 | Openfire server-properties.jsp propName Parameter XSS Openfire contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'propName' parameter upon submission to the 'server-properties.jsp' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
51423 | Openfire audit-policy.jsp Multiple Parameter XSS |
51422 | Openfire user-properties.jsp username Parameter XSS Openfire contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'username' parameter upon submission to the 'user-properties.jsp' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
51421 | Openfire group-summary.jsp search Parameter XSS Openfire contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'search' parameter upon submission to the 'group-summary.jsp' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
51420 | Openfire log.jsp log Parameter XSS Openfire contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'log' parameter upon submission to the 'log.jsp' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
51419 | Openfire logviewer.jsp log Parameter XSS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Jive Software Openfire muc-room-edit-form.jsp XSS attempt RuleID : 20868 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire server-properties.jsp XSS attempt RuleID : 20867 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire audit-policy.jsp XSS attempt RuleID : 20866 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire user-properties.jsp XSS attempt RuleID : 20865 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire group-summary.jsp XSS attempt RuleID : 20864 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire log.jsp XSS attempt RuleID : 20863 - Revision : 8 - Type : SERVER-WEBAPP |
2014-01-10 | Jive Software Openfire logviewer.jsp XSS attempt RuleID : 20862 - Revision : 8 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200904-01.nasl - Type : ACT_GATHER_INFO |
2009-02-09 | Name : The remote host contains an application that is affected by multiple vulnerab... File : openfire_3_6_3.nasl - Type : ACT_GATHER_INFO |
2009-01-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_c3aba586ea7711dd9d1e000bcdc1757a.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:09:07 |
|
2021-04-22 01:09:27 |
|
2020-05-23 00:23:19 |
|
2018-10-12 00:20:36 |
|
2017-08-08 09:24:41 |
|
2016-04-26 18:37:34 |
|
2014-02-17 10:48:44 |
|
2014-01-19 21:25:41 |
|
2013-05-10 23:43:46 |
|