A file extension handling issue was found in [server] module of ONLYOFFICE DocumentServer v4.2.0.71-v5.6.0.21. The file extension is controlled by an attacker through the request data and leads to arbitrary file overwriting. Using this vulnerability, a remote attacker can obtain remote code execution on DocumentServer.
References
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ONLYOFFICE/DocumentServer - Product, Vendor Advisory | |
References | () https://github.com/ONLYOFFICE/server - Product | |
References | () https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/DocService/sources/converterservice.js#L200 - Third Party Advisory | |
References | () https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283 - Third Party Advisory | |
References | () https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L593 - Third Party Advisory | |
References | () https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833 - Exploit, Third Party Advisory |
Information
Published : 2021-03-01 16:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25833
Mitre link : CVE-2021-25833
CVE.ORG link : CVE-2021-25833
JSON object : View
Products Affected
onlyoffice
- document_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')