Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification

Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification

junho 16, 2023 | NSFOCUS

Overview

Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of Openfire is a web-based application that has been found to be vulnerable to path traversal attacks by setting up the environment. Unauthenticated attackers use the unauthenticated Openfire setting environment in a configured Openfire environment to access the administrator user interface, gain server privileges, and ultimately execute arbitrary code on the target system. At present, the details of the vulnerability and PoC have been made public. Please take measures for protection as soon as possible.

Reference link: https://github.com/igniterealtime/Openfire/security/advisories/GHSA-gw42-f939-fhvm

Scope of Impact

Affected version

  • 3.10.0 <= Openfire <= 3.10.3
  • 4.0.0 <= Openfire <= 4.0.4
  • 4.1.0 <= Openfire <= 4.1.6
  • 4.2.0 <= Openfire <= 4.2.4
  • 4.3.0 <= Openfire <= 4.3.2
  • 4.4.0 <= Openfire <= 4.4.4
  • 4.5.0 <= Openfire <= 4.5.6
  • 4.6.0 <= Openfire <= 4.6.7
  • 4.7.0 <= Openfire <= 4.7.4

Unaffected version

  • Openfire = 4.6.8
  • Openfire = 4.7.5
  • Openfire = 4.8.0

Mitigation

Official upgrade

Currently, the official security version has been released to fix this vulnerability. It is recommended that affected users upgrade their protection in a timely manner:

Openfire versionLink
Openfire 4.6.8https://github.com/igniterealtime/Openfire/releases/tag/v4.6.8
Openfire 4.7.5https://github.com/igniterealtime/Openfire/releases/tag/v4.7.5

Mitigation measures

If it is not convenient to upgrade, network access to the Openfire administrator console can be restricted, only open to trusted addresses, and not exposed to the internet.

Use the AuthFilterSanitizer plugin, which periodically removes easily abused entries in Openfire authentication filters, thereby closing potential avenues of attack.

Note: Using the authentication filter cleaner plugin may interfere with the functionality of items in Openfire authentication filters that are susceptible to abuse.

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.

NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).

A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.