ONLYOFFICE all versions as of 2021-11-08 is vulnerable to Server-Side Request Forgery (SSRF). The document editor service can be abused to read and serve arbitrary URLs as a document.
References
Link | Resource |
---|---|
https://github.com/ONLYOFFICE/server | Third Party Advisory |
https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Exploit Mitigation Third Party Advisory |
https://www.onlyoffice.com/ | Product Vendor Advisory |
https://github.com/ONLYOFFICE/server | Third Party Advisory |
https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ | Exploit Mitigation Third Party Advisory |
https://www.onlyoffice.com/ | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ONLYOFFICE/server - Third Party Advisory | |
References | () https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/ - Exploit, Mitigation, Third Party Advisory | |
References | () https://www.onlyoffice.com/ - Product, Vendor Advisory | |
Summary |
|
Information
Published : 2023-01-23 15:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43449
Mitre link : CVE-2021-43449
CVE.ORG link : CVE-2021-43449
JSON object : View
Products Affected
onlyoffice
- server
CWE
CWE-918
Server-Side Request Forgery (SSRF)