4.3
CVSSv2

CVE-2020-12432

Published: 21/07/2020 Updated: 24/07/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The WOPI API integration for Vereign Collabora CODE up to and including 4.2.2 does not properly restrict delivery of JavaScript to a victim's browser, and lacks proper MIME type access control, which could lead to XSS that steals account credentials via cookies or local storage. The attacker must first obtain an API access token, which can be accomplished if the attacker is able to upload a .docx or .odt file. The associated API endpoints for exploitation are /wopi/files and /wopi/getAccessToken.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

collaboraoffice collabora online development edition

Github Repositories

CVE-2020-12432 Collabora CODE <= 422 Vereign's WOPI API Stored XSS and Insecure permissions (account hijack) - 422 Affected versions: Collabora CODE <= 422 Exploitation requirements: The Vereign's /wopi/ API interface has to be accessible using the provided generated token, which is the default configuration The wopi API interface developed by ver