Check Point Reference: | CPAI-2008-372 |
Date Published: | 2 Dec 2009 |
Severity: | High |
Last Updated: | Sunday 16 December, 2018 |
Source: | |
Industry Reference: | CVE-2008-6508 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Openfire (previously known as Wildfire Server) is an open source Jabber/XMPP server written in Java. Jabber is an open instant messaging technology that is maintained by the community. Extensible Messaging and Presence Protocol (XMPP) is an open, XML-inspired protocol originally aimed at near-real-time, extensible instant messaging (IM) and presence information (buddy lists), but now expanded into the broader realm of message oriented middle-ware. An authentication bypass vulnerability exists in Openfire Server product by Jive Software. The vulnerability is due to an insecure design in the Tomcat filter where all functions in the admin web-interface are not protected from unauthorized access. Remote attackers could exploit this vulnerability to access functions in the admin web-interface without supplying valid credentials. A successful attack attempt will bypass the server authentication and the attacker can have full access to all functions in the admin webinterface without providing any user credentials. Thus the attacker can gain full control of the Openfire Jabber server and cause disclosure of sensitive information. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Instant Messenger.
Attack Information: Jive Software Openfire Jabber server authentication bypass