Rapid7 Vulnerability & Exploit Database

Openfire authentication bypass with RCE plugin

Back to Search

Openfire authentication bypass with RCE plugin



Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This module will use the vulnerability to create a new admin user that will be used to upload a Openfire management plugin weaponised with java native payload that triggers an RCE. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the first version on the 4.8 branch, which is version 4.8.0.


  • h00die-gr3y <h00die.gr3y@gmail.com>






Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/openfire_auth_bypass_rce_cve_2023_32315
msf exploit(openfire_auth_bypass_rce_cve_2023_32315) > show targets
msf exploit(openfire_auth_bypass_rce_cve_2023_32315) > set TARGET < target-id >
msf exploit(openfire_auth_bypass_rce_cve_2023_32315) > show options
    ...show and set options...
msf exploit(openfire_auth_bypass_rce_cve_2023_32315) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security