← Back to CVEs
CVE-2021-34823
CRITICAL9.1
Description
The ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.
CVE Details
CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published8/13/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
on24:screenshare
Weaknesses (CWE)
CWE-611
References
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(cve@mitre.org)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/(af854a3a-2127-422b-91ae-364da2661108)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.