CVE-2021-36359
30.08.2021, 05:15
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Vendor | Product | Version |
---|---|---|
bscw | bscw_classic | 𝑥 < 5.0.12 |
bscw | bscw_classic | 5.1.0 ≤ 𝑥 < 5.1.10 |
bscw | bscw_classic | 5.2.0 ≤ 𝑥 < 5.2.4 |
bscw | bscw_classic | 7.3.0 ≤ 𝑥 < 7.3.3 |
bscw | bscw_classic | 7.4.0 ≤ 𝑥 < 7.4.3 |
𝑥
= Vulnerable software versions
References