
CVE-2009-1595 – Openfire 3.x - jabber:iq:auth 'passwd_change' Remote Password Change
https://notcve.org/view.php?id=CVE-2009-1595
11 May 2009 — The jabber:iq:auth implementation in IQAuthHandler.java in Ignite Realtime Openfire before 3.6.4 allows remote authenticated users to change the passwords of arbitrary accounts via a modified username element in a passwd_change action. La implementación jabber:iq:auth en IQAuthHandler.java de Ignite Realtime Openfire v3.6.5 permite a usuarios remotos autenticados cambiar las contraseñas de cuentas de usuario de su elección a través de un elemento "username" (nombre de usuario) modificado en la acción passwd... • https://www.exploit-db.com/exploits/32967 • CWE-287: Improper Authentication •

CVE-2009-1596 – Gentoo Linux Security Advisory 201406-35
https://notcve.org/view.php?id=CVE-2009-1596
11 May 2009 — Ignite Realtime Openfire before 3.6.5 does not properly implement the register.password (aka canChangePassword) console configuration setting, which allows remote authenticated users to bypass intended policy and change their own passwords via a passwd_change IQ packet. Ignite Realtime Openfire antes de v3.6.5 no implementa correctamente la propiedad de configuración de la consola register.password (alias canChangePassword), lo que permite eludir la política de seguridad a usuarios remotos autenticados, así... • http://secunia.com/advisories/34984 • CWE-287: Improper Authentication •

CVE-2008-6509 – Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-6509
23 Mar 2009 — SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp. Vulnerabilidad de inyección de SQL en CallLogDAO en el complemento SIP para Openfire 3.6.0a y anteriores permite a atacantes remotos ejecutar comandos SQL a través del parámetro tipo (type) de sipark-log-summary.jsp. • https://www.exploit-db.com/exploits/7075 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2008-6510 – Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-6510
23 Mar 2009 — Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter. Una vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en login.jsp en la Consola de Administración de Openfire 3.6.0a y anteriores permite a atacantes remotos inyectar HTML o scripts web arbitrarios a través del parámetro URL. • https://www.exploit-db.com/exploits/7075 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-6511 – Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-6511
23 Mar 2009 — Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter. Vulnerabilidad de redirección abierta en login.jsp en Openfire 3.6.0a y anteriores permite a atacantes remotos redirigir a los usuarios a sitios Web arbitrarios y llevar a cabo ataques de phishing a través del parámetro URL. • https://www.exploit-db.com/exploits/7075 • CWE-20: Improper Input Validation •

CVE-2008-6508 – Openfire Server 3.6.0a - Admin Console Authentication Bypass
https://notcve.org/view.php?id=CVE-2008-6508
23 Mar 2009 — Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI. Una vulnerabilidad de salto de directorio en el filtro AuthCheck de la Consola de administración de Openfire 3.6.0a y anteriores permite a atacantes remotos eludir el proceso de autenticación y acce... • https://www.exploit-db.com/exploits/19432 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2009-0496 – Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-0496
10 Feb 2009 — Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname a... • https://www.exploit-db.com/exploits/32677 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2009-0497 – Openfire 3.6.2 - 'log.jsp' Directory Traversal
https://notcve.org/view.php?id=CVE-2009-0497
10 Feb 2009 — Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter. Vulnerabilidad de salto de directorio en log.jsp en Ignite Realtime Openfire v3.6.2, permite a atacantes remotos leer ficheros de su elección a través de "..\" en el parámetro "log". • https://www.exploit-db.com/exploits/32680 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2008-1728
https://notcve.org/view.php?id=CVE-2008-1728
11 Apr 2008 — ConnectionManagerImpl.java in Ignite Realtime Openfire 3.4.5 allows remote authenticated users to cause a denial of service (daemon outage) by triggering large outgoing queues without reading messages. ConnectionManagerImpl.java en Ignite Realtime Openfire 3.4.5 permite a usuarios remotos autenticados provocar una denegación de servicio (interrupción del demonio) desencadenando grandes colas de salida sin leer los mensajes. • http://secunia.com/advisories/29751 • CWE-399: Resource Management Errors •

CVE-2007-2975
https://notcve.org/view.php?id=CVE-2007-2975
01 Jun 2007 — The admin console in Ignite Realtime Openfire 3.3.0 and earlier (formerly Wildfire) does not properly specify a filter mapping in web.xml, which allows remote attackers to gain privileges and execute arbitrary code by accessing functionality that is exposed through DWR, as demonstrated using the downloader. La consola de administración de Ignite Realtime Openfire versiones 3.3.0 y anteriores (anteriormente Wildfire), no especifica apropiadamente una asignación de filtros en el archivo web.xml, lo que permit... • http://blogs.reucon.com/srt/2007/05/11/openfire_3_3_1_fixes_critical_security_issue.html • CWE-264: Permissions, Privileges, and Access Controls •