Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-35343 : Security Advisory and Response

Learn about CVE-2021-35343, a CSRF vulnerability in SeedDMS allowing attackers to modify document names without user knowledge. Find mitigation steps here.

This article provides details about CVE-2021-35343, a Cross-Site Request Forgery (CSRF) vulnerability in SeedDMS versions 5.1.x<5.1.23 and 6.0.x<6.0.16.

Understanding CVE-2021-35343

CVE-2021-35343 is a CSRF vulnerability that allows a remote attacker to manipulate document names without the victim's knowledge.

What is CVE-2021-35343?

The vulnerability exists in the /op/op.Ajax.php endpoint in SeedDMS versions 5.1.x<5.1.23 and 6.0.x<6.0.16. By tricking an authenticated user to visit a malicious web page, an attacker can modify document names without user consent.

The Impact of CVE-2021-35343

An attacker can exploit this vulnerability to rename documents unknowingly to the user, potentially leading to confusion, unauthorized access, or unauthorized modifications.

Technical Details of CVE-2021-35343

CVE-2021-35343 is primarily characterized by the following technical aspects:

Vulnerability Description

The CSRF flaw in SeedDMS versions 5.1.x<5.1.23 and 6.0.x<6.0.16 allows unauthorized users to edit document names through a manipulated web page access.

Affected Systems and Versions

SeedDMS versions 5.1.x<5.1.23 and 6.0.x<6.0.16 are affected by this vulnerability.

Exploitation Mechanism

Remote attackers can exploit the vulnerability by luring authenticated users to visit specially crafted malicious web pages to alter document names.

Mitigation and Prevention

To address CVE-2021-35343, users and administrators are advised to implement the following security measures:

Immediate Steps to Take

        Upgrade SeedDMS to versions 5.1.23 and 6.0.16 or later to prevent exploitation.
        Avoid clicking on suspicious links or visiting untrusted websites.

Long-Term Security Practices

        Regularly monitor document name changes in SeedDMS systems to detect unauthorized modifications.
        Conduct security awareness training for users to recognize and avoid social engineering attacks.

Patching and Updates

SeedDMS users should regularly apply security patches and updates provided by the vendor to mitigate known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now