Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
2009-03-23T20:00:00.203
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | igniterealtime | openfire | ≤ 3.6.0a | Yes |
Application | igniterealtime | openfire | 2.6.0 | Yes |
Application | igniterealtime | openfire | 2.6.1 | Yes |
Application | igniterealtime | openfire | 2.6.2 | Yes |
Application | igniterealtime | openfire | 3.0.0 | Yes |
Application | igniterealtime | openfire | 3.0.1 | Yes |
Application | igniterealtime | openfire | 3.1.0 | Yes |
Application | igniterealtime | openfire | 3.1.1 | Yes |
Application | igniterealtime | openfire | 3.2.0 | Yes |
Application | igniterealtime | openfire | 3.2.1 | Yes |
Application | igniterealtime | openfire | 3.2.2 | Yes |
Application | igniterealtime | openfire | 3.2.3 | Yes |
Application | igniterealtime | openfire | 3.2.4 | Yes |
Application | igniterealtime | openfire | 3.3.0 | Yes |
Application | igniterealtime | openfire | 3.3.2 | Yes |
Application | igniterealtime | openfire | 3.3.3 | Yes |
Application | igniterealtime | openfire | 3.4.0 | Yes |
Application | igniterealtime | openfire | 3.4.1 | Yes |
Application | igniterealtime | openfire | 3.4.3 | Yes |
Application | igniterealtime | openfire | 3.4.4 | Yes |
Application | igniterealtime | openfire | 3.4.5 | Yes |
Application | igniterealtime | openfire | 3.5.0 | Yes |
Application | igniterealtime | openfire | 3.5.1 | Yes |
Application | igniterealtime | openfire | 3.5.2 | Yes |
Application | igniterealtime | openfire | 3.6.0 | Yes |