FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

openfire -- multiple vulnerabilities

Affected packages
openfire < 3.6.1

Details

VuXML ID 937adf01-b64a-11dd-a55e-00163e000016
Discovery 2008-11-07
Entry 2008-11-19
Modified 2010-05-02

Andreas Kurtz reports:

The jabber server Openfire (<= version 3.6.0a) contains several serious vulnerabilities. Depending on the particular runtime environment these issues can potentially even be used by an attacker to execute code on operating system level.

  1. Authentication bypass - This vulnerability provides an attacker full access to all functions in the admin webinterface without providing any user credentials. The Tomcat filter which is responsible for authentication could be completely circumvented.
  2. SQL injection - It is possible to pass SQL statements to the backend database through a SQL injection vulnerability. Depending on the particular runtime environment and database permissions it is even possible to write files to disk and execute code on operating system level.
  3. Multiple Cross-Site Scripting - Permits arbitrary insertion of HTML- and JavaScript code in login.jsp. An attacker could also manipulate a parameter to specify a destination to which a user will be forwarded to after successful authentication.

References

CVE Name CVE-2008-1728
CVE Name CVE-2008-6508
CVE Name CVE-2008-6509
CVE Name CVE-2008-6510
CVE Name CVE-2008-6511
CVE Name CVE-2009-1595
URL http://secunia.com/Advisories/32478/
URL http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt
URL http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html