#VU52832 Information disclosure


Published: 2021-05-04

Vulnerability identifier: #VU52832

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-29475

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
HedgeDoc
Client/Desktop applications / Other client software

Vendor: HedgeDoc

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote authenticated attacker can read arbitrary files from the file system when exporting a note to PDF.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

HedgeDoc: 0.3.3, 0.3.4, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.4.5, 0.4.6, 0.5.0, 0.5.1, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.3.2, 1.4.0

CPE

External links
https://github.com/hedgedoc/hedgedoc/commit/c1789474020a6d668d616464cb2da5e90e123f65
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pxxg-px9v-6qf3


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability