CVE-2019-18393
MEDIUM EXPLOITED NUCLEIIgniterealtime Openfire < 4.4.2 - Path Traversal
Title source: ruleDescription
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.
Exploits (2)
Nuclei Templates (1)
Ignite Realtime Openfire <4.42 - Local File Inclusion
MEDIUMby pikpikcu
Shodan:
http.title:"openfire admin console" || http.title:"openfire"
FOFA:
title="openfire" || title="openfire admin console"
Scores
CVSS v3
5.3
EPSS
0.8385
EPSS Percentile
99.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Details
VulnCheck KEV
2024-04-08
CWE
CWE-22
Status
published
Products (2)
igniterealtime/openfire
< 4.4.2
org.igniterealtime.openfire/parent
0 - 4.5.0-betaMaven
Published
Oct 24, 2019
Tracked Since
Feb 18, 2026