Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugs.gentoo.org/show_bug.cgi?id=254309 | |
http://www.securityfocus.com/bid/32943 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47835 | vdb entry |
http://www.securityfocus.com/bid/32940 | vdb entry exploit |
http://www.securityfocus.com/bid/32944 | vdb entry |
http://www.igniterealtime.org/issues/browse/JM-1506 | |
http://secunia.com/advisories/33452 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/32935 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47845 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47834 | vdb entry |
http://www.securityfocus.com/bid/32939 | vdb entry |
http://www.securityfocus.com/bid/32938 | vdb entry exploit |
http://www.securityfocus.com/bid/32937 | vdb entry exploit |
http://www.securityfocus.com/archive/1/499880/100/0/threaded | mailing list |
http://www.coresecurity.com/content/openfire-multiple-vulnerabilities | exploit |