Vulnerability Description
Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Onlyoffice | Document Server | < 5.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/ONLYOFFICE/DocumentServer/blob/903fe5ab7a275bd69c3c3346af2d21Release NotesThird Party Advisory
- https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFExploitThird Party Advisory
- https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadExploitThird Party Advisory
- https://github.com/ONLYOFFICE/DocumentServer/blob/903fe5ab7a275bd69c3c3346af2d21Release NotesThird Party Advisory
- https://github.com/moehw/poc_exploits/tree/master/CVE-2021-3199/poc_uploadImageFExploitThird Party Advisory
- https://github.com/nola-milkin/poc_exploits/blob/master/CVE-2021-3199/poc_uploadExploitThird Party Advisory
FAQ
What is CVE-2021-3199?
CVE-2021-3199 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.
How severe is CVE-2021-3199?
CVE-2021-3199 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-3199?
Check the references section above for vendor advisories and patch information. Affected products include: Onlyoffice Document Server.