Vulnerabilities
Vulnerable Software
Bscw:  >> Bscw Classic  >> 7.4.0  Security Vulnerabilities
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
CVSS Score
8.8
EPSS Score
0.049
Published
2021-08-30
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
CVSS Score
8.8
EPSS Score
0.04
Published
2021-08-30


Contact Us

Shodan ® - All rights reserved