{ "id": "CVE-2021-39181", "sourceIdentifier": "security-advisories@github.com", "published": "2021-09-01T20:15:07.383", "lastModified": "2021-09-10T19:41:00.453", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OpenOlat is a web-based learning management system (LMS). Prior to version 15.3.18, 15.5.3, and 16.0.0, using a prepared import XML file (e.g. a course) any class on the Java classpath can be instantiated, including spring AOP bean factories. This can be used to execute code arbitrary code by the attacker. The attack requires an OpenOlat user account with the authoring role. It can not be exploited by unregistered users. The problem is fixed in versions 15.3.18, 15.5.3, and 16.0.0. There are no known workarounds aside from upgrading." }, { "lang": "es", "value": "OpenOlat es un sistema de administraci\u00f3n de aprendizaje (LMS) basado en la web. En versiones anteriores a 15.3.18, 15.5.3 y 16.0.0, usando un archivo XML de importaci\u00f3n preparado (por ejemplo, un curso) se puede instanciar cualquier clase en el classpath de Java, incluyendo las f\u00e1bricas de beans de Spring AOP. Esto puede ser usado para ejecutar c\u00f3digo arbitrario por el atacante. El ataque requiere una cuenta de usuario de OpenOlat con el rol de autor. No puede ser explotado por usuarios no registrados. El problema est\u00e1 corregido en las versiones 15.3.18, 15.5.3 y 16.0.0. No se conocen soluciones aparte de la actualizaci\u00f3n" } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-91" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.3.18", "matchCriteriaId": "D18C8612-B20D-48F2-9C01-E85A5E518CD7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.5.0", "versionEndExcluding": "15.5.3", "matchCriteriaId": "9D657DED-9FB5-4E6E-BC7A-2E9F008F2C22" } ] } ] } ], "references": [ { "url": "https://github.com/OpenOLAT/OpenOLAT/commit/3f219ac457afde82e3be57bc614352ab92c05684", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-596v-3gwh-2m9w", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://jira.openolat.org/browse/OO-5548", "source": "security-advisories@github.com", "tags": [ "Permissions Required" ] } ] }