The admin console in Ignite Realtime Openfire 3.3.0 and earlier (formerly Wildfire) does not properly specify a filter mapping in web.xml, which allows remote attackers to gain privileges and execute arbitrary code by accessing functionality that is exposed through DWR, as demonstrated using the downloader.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.reucon.com/srt/2007/05/11/openfire_3_3_1_fixes_critical_security_issue.html - | |
References | () http://secunia.com/advisories/25427 - Vendor Advisory | |
References | () http://www.igniterealtime.org/issues/browse/JM-1049 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/36713 - | |
References | () http://www.securityfocus.com/bid/24205 - Patch |
Information
Published : 2007-06-01 01:30
Updated : 2024-11-21 00:32
NVD link : CVE-2007-2975
Mitre link : CVE-2007-2975
CVE.ORG link : CVE-2007-2975
JSON object : View
Products Affected
ignite_realtime
- openfire
CWE
CWE-264
Permissions, Privileges, and Access Controls