First published: Tue Feb 10 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfire | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0496 is rated as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2009-0496, upgrade to a later version of Ignite Realtime Openfire that addresses these XSS vulnerabilities.
CVE-2009-0496 allows remote attackers to execute arbitrary web scripts or HTML code on affected systems via cross-site scripting.
CVE-2009-0496 specifically affects Ignite Realtime Openfire version 3.6.2.
CVE-2009-0496 affects logviewer.jsp, log.jsp, group-summary.jsp, and user-property.jsp components in Openfire.