FreeBSD : openfire -- multiple vulnerabilities (937adf01-b64a-11dd-a55e-00163e000016)

high Nessus Plugin ID 34839

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Andreas Kurtz reports :

The jabber server Openfire (<= version 3.6.0a) contains several serious vulnerabilities. Depending on the particular runtime environment these issues can potentially even be used by an attacker to execute code on operating system level.

- Authentication bypass - This vulnerability provides an attacker full access to all functions in the admin webinterface without providing any user credentials. The Tomcat filter which is responsible for authentication could be completely circumvented.

- SQL injection - It is possible to pass SQL statements to the backend database through a SQL injection vulnerability. Depending on the particular runtime environment and database permissions it is even possible to write files to disk and execute code on operating system level.

- Multiple Cross-Site Scripting - Permits arbitrary insertion of HTML- and JavaScript code in login.jsp. An attacker could also manipulate a parameter to specify a destination to which a user will be forwarded to after successful authentication.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?bf579d52

http://www.nessus.org/u?95350c3a

https://secuniaresearch.flexerasoftware.com/Advisories/32478/

http://www.nessus.org/u?f03a81ff

Plugin Details

Severity: High

ID: 34839

File Name: freebsd_pkg_937adf01b64a11dda55e00163e000016.nasl

Version: 1.19

Type: local

Published: 11/21/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openfire, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/19/2008

Vulnerability Publication Date: 11/7/2008

Exploitable With

Metasploit (Openfire Admin Console Authentication Bypass)

Reference Information

CVE: CVE-2008-1728, CVE-2008-6508, CVE-2008-6509, CVE-2008-6510, CVE-2008-6511, CVE-2009-1595

CWE: 20, 22, 287, 399, 79, 89