OpenFire hacking ( CVE-2023-32315 )

Kurd

New member
Member
Joined
1 yrs. 8 mth. 14 days
Messages
2
Reaction score
0
Wallet
0$
A step-by-step guide to exploiting the Openfire's last vulnerability ( CVE-2023-32315 ):


1. Search & Check:
Go to
Please, Log in or Register to view URLs content!
and use the search query: app="Openfire"
Sort by countries if you want
then open them and check this link
Please, Log in or Register to view URLs content!
if you got logs then it is vulnerable and if you are redirected to login page then it is not.

2. Exploit:
Download Go environment and install it:
Please, Log in or Register to view URLs content!

Clone or download this repo:
Please, Log in or Register to view URLs content!

then run these commands inside the download/cloned repo folder:
go mod tidy
go run main.go -u
Please, Log in or Register to view URLs content!

Then wait, if it succeeds it will generate an admin login and password (open it in incognito to avoid cache problems)
After login, download this webshell and upload it as a plugin in the admin panel you just logged in:
Please, Log in or Register to view URLs content!


3. More:
My google dork is: intitle:"Openfire Admin Console" inurl:9090
After uploading the shell you will find it in the panel: Server > Server Settings > shell plugin (down left) > pass is 123
 
Top Bottom