module

Openfire Admin Console Authentication Bypass

Disclosed
2008-11-10
Created
2018-05-30

Description

This module exploits an authentication bypass vulnerability in the administration
console of Openfire servers. By using this vulnerability it is possible to
upload/execute a malicious Openfire plugin on the server and execute arbitrary Java
code. This module has been tested against Openfire 3.6.0a.

It is possible to remove the uploaded plugin after execution, however this might turn
the server in some kind of unstable state, making re-exploitation difficult. You might
want to do this manually.

Authors

Andreas Kurtz
h0ng10

Platform

Java,Linux,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/openfire_auth_bypass
msf exploit(openfire_auth_bypass) > show targets
...targets...
msf exploit(openfire_auth_bypass) > set TARGET < target-id >
msf exploit(openfire_auth_bypass) > show options
...show and set options...
msf exploit(openfire_auth_bypass) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.