Multiple cross-site request forgery (CSRF) vulnerabilities in Ignite Realtime Openfire 3.10.2 allow remote attackers to hijack the authentication of administrators for requests that (1) change a password via a crafted request to user-password.jsp, (2) add users via a crafted request to user-create.jsp, (3) edit server settings or (4) disable SSL on the server via a crafted request to server-props.jsp, or (5) add clients via a crafted request to plugins/clientcontrol/permitted-clients.jsp.
References
Configurations
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-CSRF.txt - | |
References | () http://packetstormsecurity.com/files/133554/Openfire-3.10.2-Cross-Site-Request-Forgery.html - | |
References | () http://www.securityfocus.com/archive/1/536470/100/0/threaded - | |
References | () https://security.gentoo.org/glsa/201612-50 - | |
References | () https://www.exploit-db.com/exploits/38192/ - Exploit |
Information
Published : 2015-09-16 19:59
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6973
Mitre link : CVE-2015-6973
CVE.ORG link : CVE-2015-6973
JSON object : View
Products Affected
igniterealtime
- openfire
CWE
CWE-352
Cross-Site Request Forgery (CSRF)