Andreas Kurtz

6 exploits Active since Mar 2009
CVE-2008-6510 EXPLOITDB text WRITEUP
Igniterealtime Openfire < 3.6.0a - XSS
Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter.
CVE-2008-6509 EXPLOITDB text WRITEUP
Igniterealtime Openfire < 3.6.0a - SQL Injection
SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp.
CVE-2008-6508 EXPLOITDB text WRITEUP
Igniterealtime Openfire < 3.6.0a - Path Traversal
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
CVE-2008-6508 METASPLOIT ruby WORKING POC
Igniterealtime Openfire < 3.6.0a - Path Traversal
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
CVE-2008-6508 EXPLOITDB ruby WORKING POC
Igniterealtime Openfire < 3.6.0a - Path Traversal
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
CVE-2008-6511 EXPLOITDB text WRITEUP
Igniterealtime Openfire < 3.6.0a - Improper Input Validation
Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.