CVE-2021-45967
Openfire vulnerability analysis and mitigation

Overview

A configuration error was discovered in Pascom Cloud Phone System before version 7.20.x. The vulnerability (CVE-2021-45967) involves a path traversal issue in the configuration between NGINX and a backend Tomcat server, which exposes unintended endpoints. The issue was discovered in March 2022 and received a CVSS v3.1 base score of 9.8 (CRITICAL) (NVD).

Technical details

The vulnerability stems from URI parsing inconsistencies between NGINX and Tomcat. When NGINX is configured to reverse proxy requests to Tomcat, the /..;/ path sequence is treated differently by each server - NGINX treats it as a directory while Tomcat interprets it as /../, enabling access to arbitrary servlets. This allows attackers to bypass intended access restrictions and reach non-exposed endpoints (Tutorial Boy).

Impact

The vulnerability allows attackers to access unintended endpoints on the Tomcat server through path traversal. When chained with other vulnerabilities, it could potentially lead to unauthorized remote code execution with root privileges in the affected systems (Tutorial Boy).

Mitigation and workarounds

The vulnerability has been patched in Pascom Cloud Phone System version 7.20.x and later. Users are advised to upgrade to the latest version to mitigate this security issue. Cloud-hosted instances managed by Pascom are automatically updated with the security fixes (Pascom Release Notes).

Additional resources


SourceThis report was generated using AI

Related Openfire vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-25421CRITICAL9.8
  • JavaJava
  • openfire
NoYesMar 26, 2024
CVE-2021-45967CRITICAL9.8
  • OpenfireOpenfire
  • cpe:2.3:a:igniterealtime:openfire
NoYesMar 18, 2022
CVE-2023-32315HIGH7.5
  • JavaJava
  • cpe:2.3:a:igniterealtime:openfire
YesYesMay 26, 2023
CVE-2024-25420HIGH7.2
  • JavaJava
  • openfire
NoYesMar 26, 2024
CVE-2025-59154MEDIUM5.9
  • JavaJava
  • org.igniterealtime.openfire:xmppserver
NoYesSep 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management