CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Openfire Admin Console Auth Bypass (CVE-2023-32315) β€” From Path Traversal to RCE

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Openfire (formerly Wildfire) is an open-source real-time collaboration server based on XMPP (Extensible Messaging and Presence Protocol). It provides a web-based admin console for configuration and management.

Recently, a serious vulnerability was disclosed in Openfire’s admin console. The bug allows attackers to bypass authentication checks via path traversal, ultimately leading to remote code execution (RCE) if exploited. Although a patch has been released, many servers on the internet are still exposed and vulnerable.


1. Vulnerability Overview

The Openfire Admin Console is a web application used to configure the server. Researchers discovered that an attacker could use a crafted path traversal request to bypass access control checks.

Once successful, an unauthenticated attacker could directly access backend admin pages. Since the console allows plugin installation, the attacker could upload a malicious plugin and achieve RCE on the target server.

Affected Versions:

  • 3.10.0 <= Openfire < 4.6.8
  • Openfire 4.7.5

2. Detection Tools

X-POC Remote Scanner

A lightweight tool to remotely scan networks for vulnerable Openfire instances.

xpoc -r 103 -t 10.0.0.1/24 -p 80,443,8080,8000
Enter fullscreen mode Exit fullscreen mode

Download:


CloudWalker Local Scanner

A local harmless scanner for administrators to check their own servers.

./openfire_console_auth_bypass_scanner_linux_amd64 scan --output result.json
Enter fullscreen mode Exit fullscreen mode

Download:


3. Mitigation & Fix

Temporary Workaround:

  • Restrict access to the Openfire admin console with network ACLs.
  • Avoid exposing the admin console directly to the internet unless absolutely necessary.

Permanent Fix:

  • Upgrade Openfire to one of the patched versions:

    • 4.7.4
    • 4.6.8

4. Product Support

  • SafeLine WAF: Detects exploitation attempts by default.
  • Dongjian: Supports custom PoC-based detection.
  • CloudWalker: Detection supported via updated emergency vuln package (EMERVULN-23.06.006).
  • Yuntu: Identifies Openfire fingerprints and detects PoC activity.
  • Quanxi: Released detection rules for this vulnerability.

5. Timeline

  • May 26 β€” Vulnerability publicly disclosed.
  • June 8 β€” Detailed exploitation method published.
  • June 13 β€” Chaitin Security released an emergency advisory.

References


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)

const modalMarkup = `
`; // 2. Append the markup string to the end of the document body document.body.insertAdjacentHTML('beforeend', modalMarkup);