Vulnerability Description
The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not properly restrict delivery of JavaScript to a victim's browser, and lacks proper MIME type access control, which could lead to XSS that steals account credentials via cookies or local storage. The attacker must first obtain an API access token, which can be accomplished if the attacker is able to upload a .docx or .odt file. The associated API endpoints for exploitation are /wopi/files and /wopi/getAccessToken.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Collaboraoffice | Collabora Online Development Edition | <= 4.2.2 |
Related Weaknesses (CWE)
References
- https://github.com/d7x/CVE-2020-12432ExploitThird Party Advisory
- https://www.youtube.com/watch?v=_tkRnSr6yc0ExploitThird Party Advisory
- https://github.com/d7x/CVE-2020-12432ExploitThird Party Advisory
- https://www.youtube.com/watch?v=_tkRnSr6yc0ExploitThird Party Advisory
FAQ
What is CVE-2020-12432?
CVE-2020-12432 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not properly restrict delivery of JavaScript to a victim's browser, and lacks proper MIME type access control, which could lead t...
How severe is CVE-2020-12432?
CVE-2020-12432 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-12432?
Check the references section above for vendor advisories and patch information. Affected products include: Collaboraoffice Collabora Online Development Edition.