Show plain JSON{"id": "CVE-2021-43817", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 4.7, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2021-12-13T20:15:07.700", "references": [{"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. In affected versions a reflected XSS vulnerability was found in Collabora Online. An attacker could inject unescaped HTML into a variable as they created the Collabora Online iframe, and execute scripts inside the context of the Collabora Online iframe. This would give access to a small set of user settings stored in the browser, as well as the session's authentication token which was also passed in at iframe creation time. Users should upgrade to Collabora Online 6.4.16 or higher or Collabora Online 4.2.20 or higher. Collabora Online Development Edition 21.11 is not affected."}, {"lang": "es", "value": "Collabora Online es una suite ofim\u00e1tica colaborativa online basada en la tecnolog\u00eda de LibreOffice. En las versiones afectadas fu\u00e9 encontrada una vulnerabilidad de tipo XSS reflejada en Collabora Online. Un atacante pod\u00eda inyectar HTML sin esconder en una variable al crear el iframe de Collabora Online, y ejecutar scripts dentro del contexto del iframe de Collabora Online. Esto dar\u00eda acceso a un peque\u00f1o conjunto de configuraciones de usuario almacenadas en el navegador, as\u00ed como al token de autenticaci\u00f3n de la sesi\u00f3n que tambi\u00e9n era pasado en el momento de la creaci\u00f3n del iframe. Los usuarios deben actualizar a Collabora Online versiones 6.4.16 o superior o Collabora Online 4.2.20 o superior. Collabora Online Development Edition versi\u00f3n 21.11 no est\u00e1 afectada"}], "lastModified": "2024-11-21T06:29:51.367", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "257D3870-7490-45B9-87F6-B28EADBA332A", "versionEndExcluding": "4.2.20"}, {"criteria": "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8600BC9-AEE4-41E4-B88B-F9761CF3D1D3", "versionEndExcluding": "6.4.16", "versionStartIncluding": "6.4.0"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}