First published: Fri Jun 01 2007(Updated: )
The admin console in Ignite Realtime Openfire 3.3.0 and earlier (formerly Wildfire) does not properly specify a filter mapping in web.xml, which allows remote attackers to gain privileges and execute arbitrary code by accessing functionality that is exposed through DWR, as demonstrated using the downloader.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfire | =3.2.0 | |
Openfire | =3.0.1 | |
Openfire | =2.6.1 | |
Openfire | =3.2.2 | |
Openfire | =3.2.3 | |
Openfire | =3.1.0 | |
Openfire | =3.2.1 | |
Openfire | =3.2.4 | |
Openfire | =2.6.0 | |
Openfire | <=3.3.0 | |
Openfire | =3.0.0 | |
Openfire | =2.6.2 | |
Openfire | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2975 has a high severity rating due to the potential for remote code execution.
To fix CVE-2007-2975, upgrade Ignite Realtime Openfire to version 3.3.1 or later.
CVE-2007-2975 affects Ignite Realtime Openfire versions up to and including 3.3.0.
CVE-2007-2975 allows remote attackers to gain privileges and execute arbitrary code.
A workaround for CVE-2007-2975 would be to restrict access to the admin console.