2024-12-08 03:06:42 +00:00

175 lines
5.5 KiB
JSON

{
"id": "CVE-2021-36359",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-30T05:15:07.157",
"lastModified": "2024-11-21T06:13:35.943",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\\platypus\\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3."
},
{
"lang": "es",
"value": "OrbiTeam BSCW Classic versiones anteriores a 7.4.3, permite una ejecuci\u00f3n de c\u00f3digo remota (RCE) autenticado de exportpdf por medio de la inyecci\u00f3n de etiquetas XML porque el archivo reportlab\\platypus\\paraparser.py (al que se accede por medio de bscw.cgi op=_editfolder.EditFolder) llama a eval en el c\u00f3digo Python suministrado por el atacante. Esto es corregido en las versiones 5.0.12, 5.1.10, 5.2.4, 7.3.3 y 7.4.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-91"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.12",
"matchCriteriaId": "8BFB2BFC-0110-478C-B55D-54A39FCDA3AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "5.1.10",
"matchCriteriaId": "DA00DEF6-7CC9-4696-973F-BCCE9FF47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2.0",
"versionEndExcluding": "5.2.4",
"matchCriteriaId": "DE56EADE-6552-433E-A4C5-408D611FE024"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3.0",
"versionEndExcluding": "7.3.3",
"matchCriteriaId": "91A6B0CF-DBD9-46F4-B3C2-5ADAA3BF9084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.3",
"matchCriteriaId": "355519B0-8A2B-4DAD-AB2A-858CF2715610"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Aug/23",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.bscw.de/en/company/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Aug/23",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.bscw.de/en/company/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}