Exploit Report

Computer Security And Bug Information

CVE-2021-43445

CVECVE-2021-43445
CVE Ordinal Value220506
Published Date2023-01-23T15:15Z
Modified Date2023-01-31T15:07Z
CWE TypeCWE-287
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
DescriptionONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. An attacker can authenticate with the web socket service of the ONLYOFFICE document editor which is protected by JWT auth by using a default JWT signing key.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/ONLYOFFICE/server
Reference DescriptionMISC https://github.com/ONLYOFFICE/server
Reference URLhttps://www.onlyoffice.com/
Reference DescriptionMISC https://www.onlyoffice.com/
Reference URLhttps://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
Reference DescriptionMISC https://labs.nettitude.com/blog/exploiting-onlyoffice-web-sockets-for-unauthenticated-remote-code-execution/
TagsThird Party Advisory
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles