Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01OWg4LWgzNHItcTljds4AAigs
Ignite Realtime Openfire directory traversal vulnerability
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability. Version 4.5.0-beta contains a fix for the issue.
Permalink: https://github.com/advisories/GHSA-59h8-h34r-q9cvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01OWg4LWgzNHItcTljds4AAigs
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-59h8-h34r-q9cv, CVE-2019-18393
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-18393
- https://github.com/igniterealtime/Openfire/pull/1498
- https://swarm.ptsecurity.com/openfire-admin-console/
- https://github.com/igniterealtime/Openfire/commit/cb900749d4e836b32cc6e2cc41cda17f252b977d
- https://github.com/advisories/GHSA-59h8-h34r-q9cv
Affected Packages
maven:org.igniterealtime.openfire:parent
Versions: < 4.5.0-betaFixed in: 4.5.0-beta