Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to © group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.
secunia.com/advisories/33452
www.coresecurity.com/content/openfire-multiple-vulnerabilities
www.igniterealtime.org/issues/browse/JM-1506
www.securityfocus.com/archive/1/499880/100/0/threaded
www.securityfocus.com/bid/32935
www.securityfocus.com/bid/32937
www.securityfocus.com/bid/32938
www.securityfocus.com/bid/32939
www.securityfocus.com/bid/32940
www.securityfocus.com/bid/32943
www.securityfocus.com/bid/32944
bugs.gentoo.org/show_bug.cgi?id=254309
exchange.xforce.ibmcloud.com/vulnerabilities/47834
exchange.xforce.ibmcloud.com/vulnerabilities/47835
exchange.xforce.ibmcloud.com/vulnerabilities/47845