Arbitrary File Read Vulnerability in Apache OpenMeetings
CVE-2016-2164

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
11 April 2016

Summary

The Apache OpenMeetings application is susceptible to an arbitrary file read vulnerability through its SOAP API methods, specifically 'FileService.importFileByInternalUserId' and 'FileService.importFile'. This issue arises from the improper use of the Java URL class, which fails to validate the specified protocol handler. As a result, remote attackers can exploit this flaw to read sensitive files on the server by attempting to upload a specially crafted file. This vulnerability affects versions prior to 3.1.1, highlighting the importance of upgrading to mitigate potential security risks.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.