Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32315 PoC — Openfire administration console authentication bypass

Source
Associated Vulnerability
Title:Openfire administration console authentication bypass (CVE-2023-32315)
Description:Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.
Description
CVE-2023-32315-Openfire-Bypass
Readme
# CVE-2023-32315-POC
CVE-2023-32315-Openfire-Bypass-Py

## 概述
这个代码是CVE-2023-32315 Python版本的POC,用于执行一系列操作来验证目标网站是否受 CVE-2023-32315 漏洞的影响,并尝试在受影响的网站上执行一些操作。  
经过验证,cookie的csrf和jsessionid并非必要,只要有而且格式正确就行,4.0.x左右的低版本没用csrf
本文不提供webshell,需要自行前往https://github.com/tangxiaofeng7/CVE-2023-32315-Openfire-Bypass/releases/tag/v0.1处下载  

## 功能
1、检查目标网站的版本号,并确定是否在 CVE-2023-32315 漏洞的影响范围内。  
2、获取目标网站的 JSESSIONID 和 CSRF 令牌。  
3、在目标网站上添加一个随机生成的用户。  

## 使用方法
1、确保已安装所需的 Python 版本。  
2、安装依赖库:pip install -r requirements.txt。  
3、执行命令:python script.py -u <目标URL> 来验证单个目标网站。  
4、执行命令:python script.py -l <URL文件路径> 来验证多个目标网站。 
5、可以通过 -t <线程数> 参数来指定线程数,默认为 10。  
6、结果将打印在终端上,并将详细结果写入 vuln.txt 文件中。  

## 注意事项
请确保目标网站的可访问性和正确性。  
仅在合法授权下使用此代码。  
作者对代码的使用和产生的后果不承担任何责任。  
File Snapshot

[4.0K] /data/pocs/3c8fb290a48ae2652fd34e22eb8677fa4f23a5f9 ├── [6.0K] main.py ├── [1.4K] README.md └── [ 45] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →