Description
The (1) FileService.importFileByInternalUserId and (2) FileService.importFile SOAP API methods in Apache OpenMeetings before 3.1.1 improperly use the Java URL class without checking the specified protocol handler, which allows remote attackers to read arbitrary files by attempting to upload a file.
Remediation
References
http://openmeetings.apache.org/security.html
http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html
http://www.securityfocus.com/archive/1/537887/100/0/threaded
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG
Related Vulnerabilities
CVE-2018-1000632 Vulnerability in maven package org.dom4j:dom4j
CVE-2019-16772 Vulnerability in npm package serialize-to-js
CVE-2019-17592 Vulnerability in npm package csv-parse
CVE-2023-25500 Vulnerability in maven package com.vaadin:flow-server
CVE-2011-4343 Vulnerability in maven package org.apache.myfaces.core.internal:myfaces-impl-shared