CVE-2021-25830

A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.2.0.236-v5.6.4.13. An attacker must request the conversion of the crafted file from DOCT into DOCX format. Using the chain of two other bugs related to improper string handling, an attacker can achieve remote code execution on DocumentServer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:onlyoffice:document_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:55

Type Values Removed Values Added
References () https://github.com/ONLYOFFICE/DocumentServer - Product () https://github.com/ONLYOFFICE/DocumentServer - Product
References () https://github.com/ONLYOFFICE/core - Product () https://github.com/ONLYOFFICE/core - Product
References () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918 - Third Party Advisory () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L1918 - Third Party Advisory
References () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241 - Third Party Advisory () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/Editor/BinaryFileReaderWriter.cpp#L241 - Third Party Advisory
References () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/UniFill.cpp#L343 - Third Party Advisory () https://github.com/ONLYOFFICE/core/blob/v5.6.4.13/ASCOfficePPTXFile/PPTXFormat/Logic/UniFill.cpp#L343 - Third Party Advisory
References () https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830 - Exploit, Third Party Advisory () https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25830 - Exploit, Third Party Advisory

Information

Published : 2021-03-01 16:15

Updated : 2024-11-21 05:55


NVD link : CVE-2021-25830

Mitre link : CVE-2021-25830

CVE.ORG link : CVE-2021-25830


JSON object : View

Products Affected

onlyoffice

  • document_server