The ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.
References
Link | Resource |
---|---|
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105 | Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | Third Party Advisory |
Configurations
Information
Published : 2021-08-13 10:15
Updated : 2021-08-31 07:25
NVD link : CVE-2021-34823
Mitre link : CVE-2021-34823
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
on24
- screenshare