← Zuruck zu CVEs
CVE-2021-34823
CRITICAL9.1
Beschreibung
The ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.
CVE Details
CVSS v3.1 Bewertung9.1
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht8/13/2021
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
on24:screenshare
Schwachen (CWE)
CWE-611
Referenzen
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(cve@mitre.org)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/(af854a3a-2127-422b-91ae-364da2661108)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.