Fixed
Details
Assignee
Dave CridlandDave CridlandReporter
Tim DurdenTim Durden(Deactivated)Labels
Components
Fix versions
Affects versions
Priority
Major
Details
Details
Assignee
Dave Cridland
Dave CridlandReporter
Tim Durden
Tim Durden(Deactivated)Labels
Components
Fix versions
Affects versions
Priority
Created January 4, 2016 at 5:36 PM
Updated October 28, 2020 at 11:02 AM
Resolved September 7, 2017 at 5:44 PM
hyp3rlinx reported that Openfire v3.10.2 suffers from a Remote File Inclusion (RFI) vulnerability.
Full details: https://packetstormsecurity.com/files/133560/Openfire-3.10.2-Remote-File-Inclusion.html
Vulnerability Details:
In "available-plugins.jsp" there is no validation for plugin downloads, allowing arbitrary file downloads from anywhere on the internet.
On line 40: all that needs to be satisfied is that the paramater is not null.
If the above condition check returns true, the application downloads whatever file you give it.
line 54:
Exploit code(s):
1) Download arbitrary file, e.g.
Our RFI will then be downloaded to the "openfire\plugins" directory.