Learn about the impact of CVE-2021-43445 on ONLYOFFICE, where attackers can authenticate with the web socket service using a default JWT signing key, and discover mitigation steps.
CVE-2021-43445 addresses an Incorrect Access Control vulnerability affecting ONLYOFFICE.
Understanding CVE-2021-43445
What is CVE-2021-43445?
The CVE-2021-43445 vulnerability involves ALL versions of ONLYOFFICE as of 2021-11-08 being impacted by an Incorrect Access Control issue. Attackers can exploit this by authenticating with the web socket service of the ONLYOFFICE document editor, which is safeguarded by JWT authentication, using a default JWT signing key.
The Impact of CVE-2021-43445
This vulnerability can allow unauthorized users to gain access to the ONLYOFFICE web socket service, potentially leading to unauthorized actions within the affected system.
Technical Details of CVE-2021-43445
Vulnerability Description
The vulnerability stems from an inaccurate implementation of access controls within ONLYOFFICE, enabling attackers to bypass authentication through the default JWT signing key.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by utilizing the default JWT signing key to authenticate with the web socket service, allowing unauthorized access.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates