← Volver a CVEs
CVE-2021-34823
CRITICAL9.1
Descripcion
The ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.
Detalles CVE
Puntuacion CVSS v3.19.1
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado8/13/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
on24:screenshare
Debilidades (CWE)
CWE-611
Referencias
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(cve@mitre.org)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/(af854a3a-2127-422b-91ae-364da2661108)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.