← Retour aux CVEs
CVE-2021-34823
CRITICAL9.1
Description
The ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.
Details CVE
Score CVSS v3.19.1
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie8/13/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
on24:screenshare
Faiblesses (CWE)
CWE-611
References
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(cve@mitre.org)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/(af854a3a-2127-422b-91ae-364da2661108)
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29105(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.