CVE-2009-0496
Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.
Múltiples vulnerabilidades de ejecución de secuencias de comandos cruzados en Ignite Realtime Openfire v3.6.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de los parámetros (1) "log" a (a) logviewer.jsp y (b) log.jsp; (2) "search" a (c) group-summary.jsp; (3) "username" a (d) user-properties.jsp; (4) "logDir", (5) "maxTotalSize", (6) "maxFileSize", (7) "maxDays", y (8) "logTimeout" a (e) audit-policy.jsp; (9) "propName" a (f) server-properties.jsp; y (10) "roomconfig_roomname" y (11) "roomconfig_roomdesc" a (g) muc-room-edit-form.jsp.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-01-08 First Exploit
- 2009-02-09 CVE Reserved
- 2009-02-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-09-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://www.igniterealtime.org/issues/browse/JM-1506 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/499880/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/32935 | Vdb Entry | |
http://www.securityfocus.com/bid/32939 | Vdb Entry | |
http://www.securityfocus.com/bid/32943 | Vdb Entry | |
http://www.securityfocus.com/bid/32944 | Vdb Entry | |
https://bugs.gentoo.org/show_bug.cgi?id=254309 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47834 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47835 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47845 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/32677 | 2009-01-08 | |
https://www.exploit-db.com/exploits/32679 | 2009-01-08 | |
https://www.exploit-db.com/exploits/32678 | 2009-01-08 | |
http://www.coresecurity.com/content/openfire-multiple-vulnerabilities | 2024-08-07 | |
http://www.securityfocus.com/bid/32937 | 2024-08-07 | |
http://www.securityfocus.com/bid/32938 | 2024-08-07 | |
http://www.securityfocus.com/bid/32940 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/33452 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ignite Realtime Search vendor "Ignite Realtime" | Openfire Search vendor "Ignite Realtime" for product "Openfire" | 3.6.2 Search vendor "Ignite Realtime" for product "Openfire" and version "3.6.2" | - |
Affected
|