Lucene search

K
openvasCopyright (C) 2009 SecPodOPENVAS:900484
HistoryMar 26, 2009 - 12:00 a.m.

Openfire Multiple Vulnerabilities (Mar09)

2009-03-2600:00:00
Copyright (C) 2009 SecPod
plugins.openvas.org
17

0.609 Medium

EPSS

Percentile

97.5%

This host is running Openfire and is prone to multiple
vulnerabilities.

##############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_openfire_mult_vuln_mar09.nasl 5122 2017-01-27 12:16:00Z teissa $
#
# Openfire Multiple Vulnerabilities (Mar09)
#
# Authors:
# Sujit Ghosal <[email protected]>
#
# Copyright:
# Copyright (c) 2009 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation will let the attacker cause multiple attacks in
  the context of the application i.e. Cross site scripting, disclosure of
  sensitive information, phishing attacks through the affected parameters.

  Impact level: Application/Network";

tag_affected = "Openfire version prior to 3.6.1";
tag_insight = "Multiple flaws are due to,
  - error in the AuthCheckFilter which causes access to administrative
    resources without admin authentication.
  - error in the type parameter inside the file 'sipark-log-summary.jsp'
    which causes SQL Injection attack.
  - error in the 'login.jsp' URL parameter which accept malicious chars
    as input which causes XSS attack.
  - error in the SIP-Plugin which is deactivated by default which lets the
    attack install the plugin by using admin authentication bypass methods.";
tag_solution = "Upgrade to the version 3.6.1 or later.
  http://www.igniterealtime.org/downloads/index.jsp";
tag_summary = "This host is running Openfire and is prone to multiple
  vulnerabilities.";

if(description)
{
  script_id(900484);
  script_version("$Revision: 5122 $");
  script_tag(name:"last_modification", value:"$Date: 2017-01-27 13:16:00 +0100 (Fri, 27 Jan 2017) $");
  script_tag(name:"creation_date", value:"2009-03-26 11:19:12 +0100 (Thu, 26 Mar 2009)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2008-6511", "CVE-2008-6510", "CVE-2008-6508", "CVE-2008-6509");
  script_bugtraq_id(32189);
  script_name("Openfire Multiple Vulnerabilities (Mar09)");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/32478");
  script_xref(name : "URL" , value : "http://www.milw0rm.com/exploits/7075");
  script_xref(name : "URL" , value : "http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt");
  script_xref(name : "URL" , value : "http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html");

  script_tag(name:"qod_type", value:"remote_banner");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2009 SecPod");
  script_family("Web application abuses");
  script_dependencies("gb_openfire_detect.nasl");
  script_require_ports("Services/www", 9090);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "impact" , value : tag_impact);
  exit(0);
}


include("http_func.inc");
include("version_func.inc");

firePort = get_http_port(default:9090);
if(!firePort){
  exit(0);
}

fireVer = get_kb_item("www/" + firePort + "/Openfire");
if(fireVer != NULL)
{
  # Grep for Openfire version prior to 3.6.1
  if(version_is_less(version:fireVer, test_version:"3.6.1")){
    security_message(firePort);
  }
}