Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32315 PoC — Ignite Realtime Openfire 路径遍历漏洞

Source
Associated Vulnerability
Title:Ignite Realtime Openfire 路径遍历漏洞 (CVE-2023-32315)
Description:Ignite Realtime Openfire是Ignite Realtime社区的一款采用Java开发且基于XMPP(前称Jabber,即时通讯协议)的跨平台开源实时协作(RTC)服务器。它能够构建高效率的即时通信服务器,并支持上万并发用户数量。 Ignite Realtime Openfire 存在安全漏洞,该漏洞源于允许未经身份验证的用户在已配置的 Openfire 环境中使用未经身份验证的 Openfire 设置环境,以访问为管理用户保留的 Openfire 管理控制台中的受限页面,以下产品和版
Description
Openfire Console Authentication Bypass Vulnerability with RCE plugin
Readme
# CVE-2023-32315
Openfire Console Authentication Bypass Vulnerability with RCE plugin

## Setup
```
git clone https://github.com/miko550/CVE-2023-32315.git
cd CVE-2023-32315
pip3 install -r requirements.txt
```
## Usage
```
python3 CVE-2023-32315.py -t http://127.0.0.1:9090
python3 CVE-2023-32315.py -l lists.txt
```
### Step
1. Run exploit
2. login with newly added user
3. goto tab plugin > upload plugin `openfire-management-tool-plugin.jar`
4. goto tab server > server settings > Management tool
5. Access websehll with password "123"
## Vulnerable Openfire Docker
```
docker pull nasqueron/openfire:4.7.1
sudo docker run --name openfire -d --restart=always --publish 9090:9090 --publish 5222:5222 --publish 7777:7777 --volume /srv/docker/openfire:/var/lib/openfire nasqueron/openfire:4.7.1
```
## Reference
- https://github.com/tangxiaofeng7/CVE-2023-32315-Openfire-Bypass
- https://github.com/5rGJ5aCh5oCq5YW9/CVE-2023-32315exp
File Snapshot

[4.0K] /data/pocs/6b9dd0e107ba2200230a535c72ab0844c3adce72 ├── [6.7K] CVE-2023-32315.py ├── [ 30K] openfire-management-tool-plugin.jar ├── [ 935] README.md └── [ 12] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.