Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown
CVE-2022-0217
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611).
0
Attacker Value
Unknown
CVE-2021-37601
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
0
Attacker Value
Unknown
CVE-2021-32919
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another server (when this option is enabled).
0
Attacker Value
Unknown
CVE-2021-32918
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
0
Attacker Value
Unknown
CVE-2021-32917
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
0
Attacker Value
Unknown
CVE-2021-32920
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.
0
Attacker Value
Unknown
CVE-2021-32921
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
0
Attacker Value
Unknown
CVE-2018-10847
Disclosure Date: July 30, 2018 (last updated November 27, 2024)
prosody before versions 0.10.2, 0.9.14 is vulnerable to an Authentication Bypass. Prosody did not verify that the virtual host associated with a user session remained the same across stream restarts. A user may authenticate to XMPP host A and migrate their authenticated session to XMPP host B of the same Prosody instance.
0
Attacker Value
Unknown
CVE-2017-18265
Disclosure Date: May 09, 2018 (last updated November 26, 2024)
Prosody before 0.10.0 allows remote attackers to cause a denial of service (application crash), related to an incompatibility with certain versions of the LuaSocket library, such as the lua-socket package from Debian stretch. The attacker needs to trigger a stream error. A crash can be observed in, for example, the c2s module.
0
Attacker Value
Unknown
CVE-2016-0756
Disclosure Date: January 29, 2016 (last updated November 25, 2024)
The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
0