{"vulnerability": "CVE-2021-25831", "sightings": [{"uuid": "facf8c6d-38c6-4727-9b60-300739be7325", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25831", "type": "seen", "source": "https://t.me/cibsecurity/24297", "content": "\u203c CVE-2021-25831 \u203c\n\nA file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. An attacker must request the conversion of the crafted file from PPTT into PPTX format. Using the chain of two other bugs related to improper string handling, a remote attacker can obtain remote code execution on DocumentServer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-01T18:43:15.000000Z"}, {"uuid": "04f45545-9567-4c18-82d8-4c4ea982743c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25831", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4625", "content": "#exploit\n1. CVE-2021-31862:\nSysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication\nhttps://github.com/RobertDra/CVE-2021-31862\n\n2. Research and PoC exploits for ONLYOFFICE\n(CVE-2021-25829, CVE-2021-25830, CVE-2021-25831, CVE-2021-25832, CVE-2021-25833)\nhttps://github.com/merrychap/POC-onlyoffice/tree/master", "creation_timestamp": "2021-10-30T14:32:34.000000Z"}]}