Openfire.Admin.Console.SSRF

description-logoDescription

This indicates an attack attempt to exploit a Server-Side Request Forgery Vulnerability in Ignite Realtime Openfire.
The vulnerability is due to improper sanitation of a crafted HTTP user input. A remote unauthenticated attacker could exploit this vulnerability by sending an HTTP request to the target vulnerable server. Successful exploitation leads to the disclosure of information which may be used to facilitate further compromise.

affected-products-logoAffected Products

Ignite Realtime Openfire version 4.4.2 and prior

Impact logoImpact

Security Bypass: Remote attackers can bypass security checks of vulnerable systems to make HTTP requests.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/igniterealtime/Openfire/pull/1497

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-04-18 27.771 Sig Added
2021-05-31 18.087 Default_action:pass:drop
2021-05-19 18.082