First published: Wed Sep 16 2015(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Ignite Realtime Openfire 3.10.2 allow remote attackers to hijack the authentication of administrators for requests that (1) change a password via a crafted request to user-password.jsp, (2) add users via a crafted request to user-create.jsp, (3) edit server settings or (4) disable SSL on the server via a crafted request to server-props.jsp, or (5) add clients via a crafted request to plugins/clientcontrol/permitted-clients.jsp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfire | =3.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6973 has been classified as a medium severity vulnerability due to its potential impact on user authentication.
To fix CVE-2015-6973, update Openfire to a version that addresses the CSRF vulnerabilities.
CVE-2015-6973 allows attackers to hijack administrator authentication to execute unauthorized actions such as changing passwords or adding users.
CVE-2015-6973 specifically affects Ignite Realtime Openfire version 3.10.2.
Administrators using Ignite Realtime Openfire 3.10.2 are directly impacted by CVE-2015-6973 due to the potential for unauthorized access.