Description
Openfire 4.6.0 contains a stored cross-site scripting vulnerability in the nodejs plugin that allows attackers to inject malicious scripts through the 'path' parameter. Attackers can craft a payload with script tags to execute arbitrary JavaScript in the context of administrative users viewing the nodejs configuration page.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
j5s
References
www.exploit-db.com/exploits/49229 (ExploitDB-49229)
github.com/igniterealtime/Openfire (Openfire GitHub Repository)
www.igniterealtime.org/downloads/ (Openfire Software Downloads)
www.vulncheck.com/advisories/openfire-path-stored-xss (VulnCheck Advisory: Openfire 4.6.0 - 'path' Stored XSS)