Description
Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4408 | Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. |
Github GHSA |
GHSA-jphj-5g3m-w7x6 | Ignite Realtime Openfire vulnerable to cross-site scripting |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:17:08.546Z
Reserved: 2018-06-03T00:00:00.000Z
Link: CVE-2018-11688
No data.
Status : Modified
Published: 2018-06-13T16:29:01.437
Modified: 2024-11-21T03:43:49.573
Link: CVE-2018-11688
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA