module
Openfire authentication bypass with RCE plugin
Disclosed | Created |
---|---|
2023-05-26 | 2023-07-19 |
Disclosed
2023-05-26
Created
2023-07-19
Description
Openfire is an XMPP server licensed under the Open Source Apache License.
Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack
via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment
in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for
administrative users.
This module will use the vulnerability to create a new admin user that will be used to upload a Openfire management plugin
weaponised with java native payload that triggers an RCE.
This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0.
The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the
first version on the 4.8 branch, which is version 4.8.0.
Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack
via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment
in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for
administrative users.
This module will use the vulnerability to create a new admin user that will be used to upload a Openfire management plugin
weaponised with java native payload that triggers an RCE.
This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0.
The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the
first version on the 4.8 branch, which is version 4.8.0.
Author
h00die-gr3y h00die.gr3y@gmail.com
Platform
Java
Architectures
java
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.