Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 9 Feb 2009 19:52:47 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Openfire <3.6.3 XSS vulnerabilities


It could be argued that the code execution that's enabled by CVE-2009-0496
is actually a distinct CSRF, but I'm not clear enough on the internals to
be sure.

- Steve


======================================================
Name: CVE-2009-0496
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496
Reference: BUGTRAQ:20090108 CORE-2008-1128: Openfire multiple vulnerabilities
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/499880/100/0/threaded
Reference: MISC:http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
Reference: CONFIRM:http://www.igniterealtime.org/issues/browse/JM-1506
Reference: CONFIRM:https://bugs.gentoo.org/show_bug.cgi?id=254309
Reference: BID:32935
Reference: URL:http://www.securityfocus.com/bid/32935
Reference: BID:32937
Reference: URL:http://www.securityfocus.com/bid/32937
Reference: BID:32938
Reference: URL:http://www.securityfocus.com/bid/32938
Reference: BID:32939
Reference: URL:http://www.securityfocus.com/bid/32939
Reference: BID:32940
Reference: URL:http://www.securityfocus.com/bid/32940
Reference: BID:32943
Reference: URL:http://www.securityfocus.com/bid/32943
Reference: BID:32944
Reference: URL:http://www.securityfocus.com/bid/32944
Reference: SECUNIA:33452
Reference: URL:http://secunia.com/advisories/33452
Reference: XF:openfire-mucroomeditform-xss(47845)
Reference: URL:http://xforce.iss.net/xforce/xfdb/47845
Reference: XF:openfire-multiple-scripts-xss(47834)
Reference: URL:http://xforce.iss.net/xforce/xfdb/47834
Reference: XF:openfire-serverproperties-xss(47835)
Reference: URL:http://xforce.iss.net/xforce/xfdb/47835

Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime
Openfire 3.6.2 allow remote attackers to inject arbitrary web script
or HTML via the (1) log parameter to (a) logviewer.jsp and (b)
log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username
parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize,
(6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e)
audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp;
and the (10) roomconfig_roomname and (11) roomconfig_roomdesc
parameters to (g) muc-room-edit-form.jsp.  NOTE: this can be leveraged
for arbitrary code execution by using XSS to upload a malicious
plugin.


======================================================
Name: CVE-2009-0497
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0497
Reference: BUGTRAQ:20090108 CORE-2008-1128: Openfire multiple vulnerabilities
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/499880/100/0/threaded
Reference: MISC:http://svn.igniterealtime.org/svn/repos/openfire/trunk/src/web/log.jsp
Reference: MISC:http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
Reference: MISC:https://bugs.gentoo.org/show_bug.cgi?id=257585
Reference: BID:32945
Reference: URL:http://www.securityfocus.com/bid/32945
Reference: SECUNIA:33452
Reference: URL:http://secunia.com/advisories/33452
Reference: XF:openfire-log-directory-traversal(47806)
Reference: URL:http://xforce.iss.net/xforce/xfdb/47806

Directory traversal vulnerability in log.jsp in Ignite Realtime
Openfire 3.6.2 allows remote attackers to read arbitrary files via a
..\ (dot dot backslash) in the log parameter.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.