Vulnerability CVE-2021-36359


Published: 2021-08-30

Description:
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
BSCW Server XML Injection
Armin Stock
31.08.2021

Type:

CWE-91

(XML Injection (aka Blind XPath Injection))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
BSCW -> Bscw classic 

 References:
https://www.bscw.de/en/company/
http://seclists.org/fulldisclosure/2021/Aug/23
http://packetstormsecurity.com/files/163988/BSCW-Server-XML-Injection.html

Copyright 2024, cxsecurity.com

 

Back to Top