ONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. Signed document download URLs can be forged due to a weak default URL signing key.
References
Link | Resource |
---|---|
https://github.com/ONLYOFFICE/server | Third Party Advisory |
https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Mitigation Third Party Advisory |
https://www.onlyoffice.com/ | Product Vendor Advisory |
https://github.com/ONLYOFFICE/server | Third Party Advisory |
https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Mitigation Third Party Advisory |
https://www.onlyoffice.com/ | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/ONLYOFFICE/server - Third Party Advisory | |
References | () https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ - Mitigation, Third Party Advisory | |
References | () https://www.onlyoffice.com/ - Product, Vendor Advisory |
Information
Published : 2023-01-23 15:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43444
Mitre link : CVE-2021-43444
CVE.ORG link : CVE-2021-43444
JSON object : View
Products Affected
onlyoffice
- server
CWE
CWE-287
Improper Authentication