Description
The (1) FileService.importFileByInternalUserId and (2) FileService.importFile SOAP API methods in Apache OpenMeetings before 3.1.1 improperly use the Java URL class without checking the specified protocol handler, which allows remote attackers to read arbitrary files by attempting to upload a file.
Remediation
References
http://openmeetings.apache.org/security.html
http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html
http://www.securityfocus.com/archive/1/537887/100/0/threaded
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG
Related Vulnerabilities
CVE-2021-21428 Vulnerability in maven package org.openapitools:openapi-generator-online
CVE-2020-13954 Vulnerability in maven package org.apache.cxf:cxf-rt-transports-http
CVE-2023-29525 Vulnerability in maven package org.xwiki.platform:xwiki-platform-distribution-war
CVE-2023-37942 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job