Check Point Reference: | CPAI-2008-373 |
Date Published: | 13 Oct 2009 |
Severity: | High |
Last Updated: | Tuesday 13 October, 2009 |
Source: | |
Industry Reference: | CVE-2008-6509 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Openfire (previously known as Wildfire Server) is an open source Jabber/XMPP server written in Java. Jabber is an open instant messaging technology that is maintained by the community. Extensible Messaging and Presence Protocol (XMPP) is an open, XML-inspired protocol originally aimed at near-real-time, extensible instant messaging (IM) and presence information (buddy lists), but now expanded into the broader realm of message oriented middle-ware. An SQL injection vulnerability exists in Openfire Server product by Jive Software. The vulnerability is due to lack of data validation of user input. Remote attackers could exploit this vulnerability to inject and execute SQL statement with privileges of the affected service. A successful attack attempt will cause SQL statement execution on the server, which can result in disclosure of sensitive information, data manipulation, or command execution with the privileges of the Openfire server process and configured database user. Depending on the runtime environment and database permissions, the attacker may also be able to write files to disk and execute code at the operating system level. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Instant Messenger.
Attack Information: Jive Software Openfire Jabber Server SQL injection