An issue was discovered in ONLYOFFICE Document Server 5.5.0. An attacker can craft a malicious .docx file, and exploit XML injection to enter an attacker-controlled parameter into the x2t binary, to rewrite this binary and/or libxcb.so.1, and execute code on a victim's server.
References
Link | Resource |
---|---|
https://gist.github.com/andrewaeva/beb92d3d2f1c5672dbda5050e323f6a0 | Third Party Advisory |
https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#551 | Release Notes Third Party Advisory |
https://gist.github.com/andrewaeva/beb92d3d2f1c5672dbda5050e323f6a0 | Third Party Advisory |
https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#551 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/andrewaeva/beb92d3d2f1c5672dbda5050e323f6a0 - Third Party Advisory | |
References | () https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#551 - Release Notes, Third Party Advisory |
Information
Published : 2020-04-15 15:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11535
Mitre link : CVE-2020-11535
CVE.ORG link : CVE-2020-11535
JSON object : View
Products Affected
onlyoffice
- document_server
CWE
CWE-91
XML Injection (aka Blind XPath Injection)