CVE-2019-18393
Description
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Openfire through 4.4.2 has a directory traversal in PluginServlet allowing remote authenticated attackers to read arbitrary files outside the home directory.
Vulnerability
Description CVE-2019-18393 is a directory traversal vulnerability in Ignite Realtime Openfire, affecting versions through 4.4.2 [1]. The flaw resides in PluginServlet.java, which fails to validate that retrieved files are located under the Openfire home directory [2]. This allows an attacker to request arbitrary files from the host filesystem by manipulating the file path parameter.
Exploitation
An attacker can exploit this vulnerability by sending specially crafted HTTP requests to the PluginServlet, traversing directory paths to access files outside the intended scope [1][2]. The attacker must be authenticated to reach the PluginServlet, as it is part of the administrative console [3]. No additional privileges beyond a valid user session are required to trigger the directory traversal.
Impact
Successful exploitation enables an attacker to read sensitive files on the server, such as configuration files containing database credentials, private keys, or user data [1][2]. Since Openfire is often deployed in enterprise environments and exposed to the internet, this could lead to further compromise of the XMPP messaging infrastructure [3].
Mitigation
The vendor addressed the vulnerability in commit cb900749d4e836b32cc6e2cc41cda17f252b977d [4]. The fix introduces a system property plugins.servlet.allowLocalFileReading set to false by default, which disallows access to files outside Openfire's home directory [2][4]. Users should upgrade to a patched version or set this property explicitly in openfire.xml as a defense-in-depth measure.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.igniterealtime.openfire:parentMaven | < 4.5.0-beta | 4.5.0-beta |
Affected products
2- Ignite Realtime/Openfiredescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-59h8-h34r-q9cvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-18393ghsaADVISORY
- github.com/igniterealtime/Openfire/commit/cb900749d4e836b32cc6e2cc41cda17f252b977dghsaWEB
- github.com/igniterealtime/Openfire/pull/1498ghsax_refsource_MISCWEB
- swarm.ptsecurity.com/openfire-admin-consoleghsaWEB
- swarm.ptsecurity.com/openfire-admin-console/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.