CVE-2009-0496

Ignite Realtime Openfire 3.6.2 - XSS

Title source: llm

Description

Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Federico Muttis · textwebappsjsp
https://www.exploit-db.com/exploits/32679
exploitdb WRITEUP VERIFIED
by Federico Muttis · textwebappsjsp
https://www.exploit-db.com/exploits/32677
exploitdb WRITEUP VERIFIED
by Federico Muttis · textwebappsjsp
https://www.exploit-db.com/exploits/32678

Scores

EPSS 0.1414
EPSS Percentile 94.3%

Classification

CWE
CWE-79
Status published

Affected Products (2)

ignite_realtime/openfire
n/a/n/a

Timeline

Published Feb 10, 2009
Tracked Since Feb 18, 2026