OrbiTeam BSCW Classic before 7.4.3 is vulnerable to exportpdf authenticated remote code execution (RCE) via XML tag injection. Learn about the impact, technical details, affected versions, and mitigation steps.
OrbiTeam BSCW Classic before 7.4.3 is vulnerable to exportpdf authenticated remote code execution (RCE) via XML tag injection. This allows attackers to execute arbitrary Python code. The issue has been fixed in versions 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Understanding CVE-2021-36359
This section will delve into the details of the CVE-2021-36359 vulnerability.
What is CVE-2021-36359?
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection. Attackers can exploit this vulnerability by injecting and executing malicious Python code.
The Impact of CVE-2021-36359
The vulnerability in OrbiTeam BSCW Classic before version 7.4.3 can lead to authenticated remote code execution, enabling threat actors to execute arbitrary Python code on the target system.
Technical Details of CVE-2021-36359
In this section, we will explore the technical aspects of the CVE-2021-36359 vulnerability.
Vulnerability Description
The issue arises due to the vulnerability in reportlab\platypus\paraparser.py, which is accessed via bscw.cgi op=_editfolder.EditFolder. This component calls eval on attacker-supplied Python code, leading to RCE.
Affected Systems and Versions
OrbiTeam BSCW Classic versions before 7.4.3 are affected by this vulnerability. The fixed versions include 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Exploitation Mechanism
Attackers exploit the CVE-2021-36359 vulnerability by injecting malicious XML tags that trigger the execution of arbitrary Python code, enabling remote code execution.
Mitigation and Prevention
This section will provide insights into mitigating the risks associated with CVE-2021-36359.
Immediate Steps to Take
Users are advised to update OrbiTeam BSCW Classic to versions 5.0.12, 5.1.10, 5.2.4, 7.3.3, or 7.4.3 to mitigate the risk of exploitation.
Long-Term Security Practices
Implement secure coding practices, input validation mechanisms, and robust access controls to prevent similar RCE vulnerabilities in the future.
Patching and Updates
Regularly apply security patches and updates provided by OrbiTeam to ensure that the software is protected against known vulnerabilities.