Looking for the vulnerability index of Invicti's legacy products?
Openfire Path Traversal (CVE-2023-32315) - Vulnerability Database

Openfire Path Traversal (CVE-2023-32315)

Description

Openfire, an open-source XMPP server, contains a path traversal vulnerability (CVE-2023-32315) that allows attackers to bypass authentication controls on administrative endpoints. By manipulating URL paths with traversal sequences, unauthorized users can access restricted administrative functions without providing valid credentials. This vulnerability affects the administration console's authentication mechanism, enabling complete circumvention of security controls.

Remediation

Apply the following remediation steps immediately:

1. Upgrade Openfire to version 4.6.8, 4.7.5, or later, which contain patches for CVE-2023-32315
2. Verify the upgrade was successful by checking the version in the administration console
3. Review administrative access logs for any suspicious activity or unauthorized access attempts prior to patching
4. If immediate patching is not possible, restrict network access to the administration console (typically port 9090/9091) to trusted IP addresses only using firewall rules
5. After upgrading, reset all administrative passwords as a precautionary measure

Consult the official Openfire security advisory and release notes for additional upgrade instructions specific to your deployment.

Related Vulnerabilities