CVE-2019-18394
Description
A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ignite Realtime Openfire through 4.4.2 contains a Server-Side Request Forgery (SSRF) vulnerability in FaviconServlet.java allowing unauthenticated attackers to send arbitrary HTTP GET requests to internal networks.
Vulnerability
Overview
The FaviconServlet.java in Ignite Realtime Openfire (up to version 4.4.2) suffers from a Server-Side Request Forgery (SSRF) vulnerability. The servlet's doGet method accepts a host parameter and constructs a URL of the form http:///favicon.ico without any validation. It then fetches that URL and returns the response to the requester [1]. This allows an attacker to force the server to make arbitrary HTTP GET requests to any host reachable from the server.
Exploitation
No authentication is required to trigger the vulnerability. The Openfire admin console is often exposed on ports 9090 (HTTP) and 9091 (HTTPS) to external networks [1]. An attacker can craft a request to the FaviconServlet with a host parameter pointing to internal IP addresses (e.g., 127.0.0.1, 10.0.0.1) or other internal services. The server will fetch the favicon from that target and return the full response body, effectively enabling the attacker to read internal web pages and probe internal services [1].
Impact
This SSRF vulnerability allows an unauthenticated attacker to perform reconnaissance of internal networks, access internal web applications, and potentially retrieve sensitive information from services that are not intended to be exposed externally. The response is returned in full, making it a full-read SSRF [1].
Mitigation
The vulnerability has been fixed in commit c2ccb38 [2]. The fix adds a check to ensure that the response from the fetched URL is actually an image before returning it, preventing the disclosure of non-image content. Users should upgrade to a patched version of Openfire. The issue is tracked as OF-1885 [2] and is documented in the NVD entry [4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.igniterealtime.openfire:parentMaven | < 4.5.0-beta | 4.5.0-beta |
Affected products
2- Ignite Realtime/Openfiredescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-mfjw-x4q4-69p9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-18394ghsaADVISORY
- github.com/igniterealtime/Openfire/commit/c2ccb38250910587498597955d0bbee8b58e46dfghsaWEB
- github.com/igniterealtime/Openfire/pull/1497ghsax_refsource_MISCWEB
- swarm.ptsecurity.com/openfire-admin-consoleghsaWEB
- swarm.ptsecurity.com/openfire-admin-console/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.