The (1) FileService.importFileByInternalUserId and (2) FileService.importFile SOAP API methods in Apache OpenMeetings before 3.1.1 improperly use the Java URL class without checking the specified protocol handler, which allows remote attackers to read arbitrary files by attempting to upload a file.
References
Configurations
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://openmeetings.apache.org/security.html - Patch, Vendor Advisory | |
References | () http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html - | |
References | () http://www.securityfocus.com/archive/1/537887/100/0/threaded - | |
References | () https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG - |
Information
Published : 2016-04-11 14:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2164
Mitre link : CVE-2016-2164
CVE.ORG link : CVE-2016-2164
JSON object : View
Products Affected
apache
- openmeetings
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor