Vulnerability Description
The Admin Console in Ignite Realtime Openfire Server before 4.1.7 allows arbitrary client-side JavaScript code execution on victims who click a crafted setup/setup-host-settings.jsp?domain= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Igniterealtime | Openfire | <= 4.1.6 |
Related Weaknesses (CWE)
References
- https://becomepentester.blogspot.ae/2017/10/Cross-Site-Scripting-Openfire-4.1.6-Issue TrackingThird Party Advisory
- https://issues.igniterealtime.org/browse/OF-1417Issue TrackingVendor Advisory
- https://becomepentester.blogspot.ae/2017/10/Cross-Site-Scripting-Openfire-4.1.6-Issue TrackingThird Party Advisory
- https://issues.igniterealtime.org/browse/OF-1417Issue TrackingVendor Advisory
FAQ
What is CVE-2017-15911?
CVE-2017-15911 is a vulnerability with a CVSS score of 4.8 (MEDIUM). The Admin Console in Ignite Realtime Openfire Server before 4.1.7 allows arbitrary client-side JavaScript code execution on victims who click a crafted setup/setup-host-settings.jsp?domain= link, aka ...
How severe is CVE-2017-15911?
CVE-2017-15911 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15911?
Check the references section above for vendor advisories and patch information. Affected products include: Igniterealtime Openfire.