6.5
CVSSv2

CVE-2021-36359

Published: 30/08/2021 Updated: 01/09/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

OrbiTeam BSCW Classic prior to 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bscw bscw classic

Exploits

BSCW Server versions 742 and below, 732 and below, 523 and below, 519 and below, and 5011 and below suffer from an XML tag injection vulnerability ...