Описание
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
Ссылки
- Exploit
- Exploit
- PatchVendor Advisory
- PatchVendor Advisory
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- PatchVendor Advisory
- PatchVendor Advisory
- Exploit
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.6.0a (включая)
Одно из
cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.77144
Высокий
7.5 High
CVSS2
Дефекты
CWE-22
Связанные уязвимости
github
больше 3 лет назад
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
EPSS
Процентиль: 99%
0.77144
Высокий
7.5 High
CVSS2
Дефекты
CWE-22