Vulnerability Description
Ignite Realtime Openfire 3.10.2 allows remote authenticated users to gain administrator access via the isadmin parameter to user-edit-form.jsp.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Igniterealtime | Openfire | 3.10.2 |
Related Weaknesses (CWE)
References
- http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-PRIV-ESCALATION.txt
- http://packetstormsecurity.com/files/133559/Openfire-3.10.2-Privilege-EscalationExploit
- https://igniterealtime.org/issues/browse/OF-941
- https://security.gentoo.org/glsa/201612-50
- https://www.exploit-db.com/exploits/38190/Exploit
- http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-PRIV-ESCALATION.txt
- http://packetstormsecurity.com/files/133559/Openfire-3.10.2-Privilege-EscalationExploit
- https://igniterealtime.org/issues/browse/OF-941
- https://security.gentoo.org/glsa/201612-50
- https://www.exploit-db.com/exploits/38190/Exploit
FAQ
What is CVE-2015-7707?
CVE-2015-7707 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Ignite Realtime Openfire 3.10.2 allows remote authenticated users to gain administrator access via the isadmin parameter to user-edit-form.jsp.
How severe is CVE-2015-7707?
CVE-2015-7707 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7707?
Check the references section above for vendor advisories and patch information. Affected products include: Igniterealtime Openfire.