Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
https://www.exploit-db.com/exploits/7075
https://exchange.xforce.ibmcloud.com/vulnerabilities/46488
http://www.vupen.com/english/advisories/2008/3061
http://www.securityfocus.com/archive/1/498162/100/0/threaded
http://www.igniterealtime.org/issues/browse/JM-1489
http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html