FKIE_CVE-2007-2975
Vulnerability from fkie_nvd - Published: 2007-06-01 01:30 - Updated: 2026-04-23 00:35
Severity ?
Summary
The admin console in Ignite Realtime Openfire 3.3.0 and earlier (formerly Wildfire) does not properly specify a filter mapping in web.xml, which allows remote attackers to gain privileges and execute arbitrary code by accessing functionality that is exposed through DWR, as demonstrated using the downloader.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ignite_realtime | openfire | * | |
| ignite_realtime | openfire | 2.6.0 | |
| ignite_realtime | openfire | 2.6.1 | |
| ignite_realtime | openfire | 2.6.2 | |
| ignite_realtime | openfire | 3.0.0 | |
| ignite_realtime | openfire | 3.0.1 | |
| ignite_realtime | openfire | 3.1.0 | |
| ignite_realtime | openfire | 3.1.1 | |
| ignite_realtime | openfire | 3.2.0 | |
| ignite_realtime | openfire | 3.2.1 | |
| ignite_realtime | openfire | 3.2.2 | |
| ignite_realtime | openfire | 3.2.3 | |
| ignite_realtime | openfire | 3.2.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:*:*:*:*:*:*:*:*",
"matchCriteriaId": "294D3DFC-F211-4403-8C4E-B90134D01F2B",
"versionEndIncluding": "3.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "530BD930-529B-48C1-B3F1-D968115DCEE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A20BA3D1-F270-4EDB-B60C-ED97C66C46BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E452066F-34AA-4033-AD8D-87BC78949B8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A5E5-335C-4FBE-B902-D7F9AFF705B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF9C7B5-9374-4256-B4CC-B04E1B51B03D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D731C51-8D5B-4C71-9B76-88969AB7D8A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F917329-ECCD-42AC-9E41-ABB80547DA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26A2A594-39D1-4788-95D1-217D81811529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F33BBDFE-FF0F-4FE2-911D-B200453929A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0588EA6E-CD30-43F7-98F4-7C592D7639D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36AE42C7-B84A-421A-BBFC-7A20D69FCD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ignite_realtime:openfire:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9C7C90-9DE7-484C-AF90-E9A97DBFC1D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The admin console in Ignite Realtime Openfire 3.3.0 and earlier (formerly Wildfire) does not properly specify a filter mapping in web.xml, which allows remote attackers to gain privileges and execute arbitrary code by accessing functionality that is exposed through DWR, as demonstrated using the downloader."
},
{
"lang": "es",
"value": "La consola de administraci\u00f3n de Ignite Realtime Openfire versiones 3.3.0 y anteriores (anteriormente Wildfire), no especifica apropiadamente una asignaci\u00f3n de filtros en el archivo web.xml, lo que permite a atacantes remotos alcanzar privilegios y ejecutar c\u00f3digo arbitrario mediante el acceso a la funcionalidad que se expone por medio de DWR, como es demostrado usando el descargador."
}
],
"evaluatorSolution": "The vendor has addressed this issue through the release of the following product updates:\r\n\r\nIgnite Realtime openfire-3.3.1-1.i386.rpm\r\nhttp://www.igniterealtime.org/downloads/download-landing.jsp?file=open fire/openfire-3.3.1-1.i386.rpm\r\n\r\nIgnite Realtime openfire_3_3_1.dmg\r\nhttp://www.igniterealtime.org/downloads/download-landing.jsp?file=open fire/openfire_3_3_1.dmg\r\n\r\nIgnite Realtime openfire_3_3_1.exe\r\nhttp://www.igniterealtime.org/downloads/download-landing.jsp?file=open fire/openfire_3_3_1.exe",
"id": "CVE-2007-2975",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-06-01T01:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://blogs.reucon.com/srt/2007/05/11/openfire_3_3_1_fixes_critical_security_issue.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25427"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.igniterealtime.org/issues/browse/JM-1049"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/36713"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/24205"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blogs.reucon.com/srt/2007/05/11/openfire_3_3_1_fixes_critical_security_issue.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25427"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.igniterealtime.org/issues/browse/JM-1049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/36713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/24205"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…