A file extension handling issue was found in [server] module of ONLYOFFICE DocumentServer v4.2.0.71-v5.6.0.21. The file extension is controlled by an attacker through the request data and leads to arbitrary file overwriting. Using this vulnerability, a remote attacker can obtain remote code execution on DocumentServer.
References
Link | Resource |
---|---|
https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L593 | Third Party Advisory |
https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/DocService/sources/converterservice.js#L200 | Third Party Advisory |
https://github.com/ONLYOFFICE/DocumentServer | Product Vendor Advisory |
https://github.com/ONLYOFFICE/server | Product |
https://github.com/ONLYOFFICE/server/blob/v5.6.0.21/FileConverter/sources/converter.js#L283 | Third Party Advisory |
https://github.com/merrychap/poc_exploits/tree/master/ONLYOFFICE/CVE-2021-25833 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-03-01 08:15
Updated : 2021-03-15 12:53
NVD link : CVE-2021-25833
Mitre link : CVE-2021-25833
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
onlyoffice
- document_server