Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?


Malware & Threats

3,000 Openfire Servers Exposed to Attacks Targeting Recent Vulnerability

More than 3,000 Openfire servers are not patched against a recent vulnerability and are exposed to attacks employing a new exploit.

More than 3,000 Openfire servers have not been patched against a recent vulnerability and remain exposed to attacks relying on a new exploit, vulnerability intelligence firm VulnCheck reports.

Maintained by Ignite Realtime, Openfire is a cross-platform real time collaboration server written in Java that uses the XMPP protocol, and which supports administration via a web interface.

Tracked as CVE-2023-32315, the high-severity flaw was discovered in Openfire’s administration console and is described as a path traversal bug via the setup environment that allows unauthenticated attackers to access restricted pages in the admin console.

The issue exists because the path traversal protections in Openfire did not protect against ‘certain non-standard URL encoding for UTF-16 characters’ that were not supported by the webserver – support was added without updating the protections.

All Openfire iterations from version 3.10.0, which was released in April 2015, through versions 4.7.5 and 4.6.8, released in May 2023 to patch the vulnerability, are impacted.

The vulnerability has been exploited in malicious attacks for more than two months, with threat actors seen creating new admin console user accounts to install a new plugin containing a remote web shell, allowing them to execute arbitrary commands and access any data on the server.

Various public exploits targeting CVE-2023-32315 are already available, but all follow the same pattern. However, VulnCheck now says it has discovered a new exploit path that does not require creating the administrative user account.

The threat intelligence firm says it has identified over 6,300 Openfire servers accessible from the internet, with roughly half of them being either patched against the vulnerability, older versions that are not vulnerable, or forks that might not be affected.

Advertisement. Scroll to continue reading.

“This leaves approximately 50% of the internet-facing Openfire servers using affected versions. While that’s only a few thousand servers, it’s a decent number given the server’s trusted position associated with chat clients,” VulnCheck notes.

Because the security defect allows an unauthenticated attacker to access the plugin administration endpoint, the firm explains, the attacker can upload the plugin directly and then access the web shell, also without authentication.

“This approach keeps login attempts out of the security audit log and prevents the ‘uploaded plugin’ notification from being recorded. That’s a pretty big deal because it leaves no evidence in the security audit log,” VulnCheck explains.

While the malicious activity might be visible in the openfire.log file, the attacker can use the path traversal to delete the log via the web shell, thus leaving the plugin itself as the only indicator of compromise, the company warns.

“This vulnerability has already been exploited in the wild, likely even by a well-known botnet. With plenty of vulnerable internet-facing systems, we assume exploitation will continue into the future,” VulnCheck concludes.

Related: Over 20,000 Citrix Appliances Vulnerable to New Exploit

Related: APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure

Related: PoC Exploit Published for Cisco AnyConnect Secure Vulnerability

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

More People On The Move

Expert Insights