Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Ignite Realtime Openfire 3.10.2 allow remote attackers to hijack the authentication of administrators for requests that (1) change a password via a crafted request to user-password.jsp, (2) add users via a crafted request to user-create.jsp, (3) edit server settings or (4) disable SSL on the server via a crafted request to server-props.jsp, or (5) add clients via a crafted request to plugins/clientcontrol/permitted-clients.jsp.
Exploits (1)
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/536470/100/0/threaded
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201612-50
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/133554/Openfire-3.10.2-Cross-Site-Request-Forgery.html
Various Sources x_refsource_misc
http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-CSRF.txt
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/38192/
Scores
EPSS
0.1608
EPSS Percentile
94.8%
Details
CWE
CWE-352
Status
published
Products (1)
igniterealtime/openfire
3.10.2
Published
Sep 16, 2015
Tracked Since
Feb 18, 2026