Description
OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32.
Affected Software
Related
{"id": "CVE-2021-28095", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-28095", "description": "OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32.", "published": "2021-07-30T14:15:00", "modified": "2022-07-12T17:42:00", "epss": [{"cve": "CVE-2021-28095", "epss": 0.00105, "percentile": 0.41545, "modified": "2023-05-27"}], "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.8}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.2, "impactScore": 2.5}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28095", "reporter": "cve@mitre.org", "references": ["http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html", "http://seclists.org/fulldisclosure/2021/Jul/37", "https://www.open-xchange.com"], "cvelist": ["CVE-2021-28095"], "immutableFields": [], "lastseen": "2023-05-27T14:34:48", "viewCount": 27, "enchantments": {"dependencies": {}, "score": {"value": 2.1, "vector": "NONE"}, "twitter": {"counter": 2, "modified": "2021-07-31T07:51:36", "tweets": [{"link": "https://twitter.com/WolfgangSesin/status/1424801480268296196", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-28095 (open-xchange_documents)) has been published on https://t.co/r7xEDq5A0z?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1424801480268296196", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-28095 (open-xchange_documents)) has been published on https://t.co/r7xEDq5A0z?amp=1"}]}, "backreferences": {}, "exploitation": null, "affected_software": {"major_version": [{"name": "open-xchange open-xchange documents", "version": 7}]}, "epss": [{"cve": "CVE-2021-28095", "epss": 0.00105, "percentile": 0.41414, "modified": "2023-05-07"}], "vulnersScore": 2.1}, "_state": {"dependencies": 1685211539, "score": 1685198089, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "e796c0ef10fb90981631e462295f79fa"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:open-xchange:open-xchange_documents:7.10.5"], "cpe23": ["cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision2:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:-:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision1:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision3:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision4:*:*:*:*:*:*"], "cwe": ["CWE-326"], "affectedSoftware": [{"cpeName": "open-xchange:open-xchange_documents", "version": "7.10.5", "operator": "eq", "name": "open-xchange open-xchange documents"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision1:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision2:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision3:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:revision4:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:*:*:*:*:*:*:*", "versionEndExcluding": "7.10.5", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:open-xchange:open-xchange_documents:7.10.5:-:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html", "name": "http://packetstormsecurity.com/files/163569/OX-Documents-7.10.5-Improper-Authorization.html", "refsource": "MISC", "tags": ["Third Party Advisory", "VDB Entry"]}, {"url": "http://seclists.org/fulldisclosure/2021/Jul/37", "name": "20210720 Open-Xchange Security Advisory 2021-07-19", "refsource": "FULLDISC", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "https://www.open-xchange.com", "name": "https://www.open-xchange.com", "refsource": "MISC", "tags": ["Product"]}], "product_info": [{"vendor": "Open-xchange", "product": "Open-xchange_documents"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "exploits": [], "assigned": "1976-01-01T00:00:00"}
{"prion": [{"lastseen": "2023-08-16T02:54:40", "description": "OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.8, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 2.5}, "published": "2021-07-30T14:15:00", "type": "prion", "title": "CVE-2021-28095", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-28095"], "modified": "2022-07-12T17:42:00", "id": "PRION:CVE-2021-28095", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-28095", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}]}