Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:JABBER-SERVER-BYPASS

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Jive Software Openfire Jabber Server Authentication Bypass

Release Date

2010/10/18

Update Number

1794

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Jive Software Openfire Jabber Server Authentication Bypass


An authentication bypass vulnerability exists in Openfire Server product by Jive Software. The vulnerability is due to an insecure design in the Tomcat filter where all functions in the admin web-interface are not protected from unauthorized access. Remote attackers could exploit this vulnerability to access functions in the admin web-interface without supplying valid credentials. A successful attack attempt will bypass the server authentication and the attacker can have full access to all functions in the admin webinterface without providing any user credentials. Thus the attacker can gain full control of the Openfire Jabber server and cause disclosure of sensitive information.

Extended Description

Openfire is prone to multiple input-validation vulnerabilities: - An SQL-injection issue. - Multiple cross-site scripting issues. - An authentication-bypass issue. A successful exploit of these issues may allow an attacker to gain unauthorized access to the affected application, compromise the application, access or modify data, exploit vulnerabilities in the underlying database, execute arbitrary script code within the context of the browser, and steal cookie-based authentication credentials. Other attacks are also possible. Openfire 3.6.0a is vulnerable; other versions may also be affected.

Affected Products

  • Gentoo linux
  • Ignite_realtime openfire 3.6.0A

References

  • BugTraq: 32189
  • CVE: CVE-2008-6508
  • URL: http://community.igniterealtime.org/thread/35874

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out