CVE-2019-18393

MEDIUM EXPLOITED NUCLEI

Igniterealtime Openfire < 4.4.2 - Path Traversal

Title source: rule

Description

PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.

Exploits (2)

nomisec STUB
by dawetmaster · poc
https://github.com/dawetmaster/CVE-2019-18393-Openfire-vulnerable
nomisec STUB
by andikahilmy · poc
https://github.com/andikahilmy/CVE-2019-18393-Openfire-vulnerable

Nuclei Templates (1)

Ignite Realtime Openfire <4.42 - Local File Inclusion
MEDIUMby pikpikcu
Shodan: http.title:"openfire admin console" || http.title:"openfire"
FOFA: title="openfire" || title="openfire admin console"

Scores

CVSS v3 5.3
EPSS 0.8385
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Details

VulnCheck KEV 2024-04-08
CWE
CWE-22
Status published
Products (2)
igniterealtime/openfire < 4.4.2
org.igniterealtime.openfire/parent 0 - 4.5.0-betaMaven
Published Oct 24, 2019
Tracked Since Feb 18, 2026