Miggo Logo

CVE-2023-32315:
Administration Console authentication bypass in openfire xmppserver

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.99986%
Published
5/23/2023
Updated
11/7/2023
KEV Status
Yes
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.igniterealtime.openfire:xmppservermaven>= 3.10.0, < 4.6.84.6.8
org.igniterealtime.openfire:xmppservermaven>= 4.7.0, < 4.7.54.7.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key factors: 1) Path traversal protection didn't handle UTF-16 encoded characters properly, and 2) The authentication exclusion mechanism used wildcards that interacted dangerously with path traversal. The AuthCheckFilter's URL matching function is central to both aspects. The commit diff shows changes to exclusion patterns and security documentation explicitly mentions this class as handling authentication checks. The testURLPassesExclude() method would be responsible for both the wildcard pattern matching and path traversal validation, making it the logical point of vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n import*nt s**urity issu* *****ts * r*n** o* v*rsions o* Op*n*ir*, t** *ross-pl*t*orm r**l-tim* *oll**or*tion s*rv*r **s** on t** XMPP proto*ol t**t is *r**t** *y t** I*nit* R**ltim* *ommunity. ### Imp**t Op*n*ir*'s **ministr*tiv* *onsol* (t** **

Reasoning

T** vuln*r**ility st*ms *rom two k*y ***tors: *) P*t* tr*v*rs*l prot**tion *i*n't **n*l* UT*-** *n*o*** ***r**t*rs prop*rly, *n* *) T** *ut**nti**tion *x*lusion m****nism us** wil***r*s t**t int*r**t** **n**rously wit* p*t* tr*v*rs*l. T** `*ut*****k*