Vulnerability Details CVE-2016-0756
The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.6%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2016-0756
-
cpe:2.3:a:prosody:prosody:-
-
cpe:2.3:a:prosody:prosody:0.1.0
-
cpe:2.3:a:prosody:prosody:0.2.0
-
cpe:2.3:a:prosody:prosody:0.3.0
-
cpe:2.3:a:prosody:prosody:0.4.0
-
cpe:2.3:a:prosody:prosody:0.4.1
-
cpe:2.3:a:prosody:prosody:0.4.2
-
cpe:2.3:a:prosody:prosody:0.5.0
-
cpe:2.3:a:prosody:prosody:0.5.1
-
cpe:2.3:a:prosody:prosody:0.5.2
-
cpe:2.3:a:prosody:prosody:0.6.0
-
cpe:2.3:a:prosody:prosody:0.6.1
-
cpe:2.3:a:prosody:prosody:0.6.2
-
cpe:2.3:a:prosody:prosody:0.7.0
-
cpe:2.3:a:prosody:prosody:0.8.0
-
cpe:2.3:a:prosody:prosody:0.8.1
-
cpe:2.3:a:prosody:prosody:0.8.2
-
cpe:2.3:a:prosody:prosody:0.9.0
-
cpe:2.3:a:prosody:prosody:0.9.1
-
cpe:2.3:a:prosody:prosody:0.9.2
-
cpe:2.3:a:prosody:prosody:0.9.3
-
cpe:2.3:a:prosody:prosody:0.9.4
-
cpe:2.3:a:prosody:prosody:0.9.5
-
cpe:2.3:a:prosody:prosody:0.9.6
-
cpe:2.3:a:prosody:prosody:0.9.7
-
cpe:2.3:a:prosody:prosody:0.9.8
-
cpe:2.3:a:prosody:prosody:0.9.9