Description
The (1) FileService.importFileByInternalUserId and (2) FileService.importFile SOAP API methods in Apache OpenMeetings before 3.1.1 improperly use the Java URL class without checking the specified protocol handler, which allows remote attackers to read arbitrary files by attempting to upload a file.
Remediation
References
http://openmeetings.apache.org/security.html
http://packetstormsecurity.com/files/136434/Apache-OpenMeetings-3.0.7-Arbitary-File-Read.html
http://www.securityfocus.com/archive/1/537887/100/0/threaded
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG
Related Vulnerabilities
CVE-2017-16003 Vulnerability in npm package windows-build-tools
CVE-2018-20676 Vulnerability in maven package org.webjars.bower:bootstrap-sass
CVE-2023-24432 Vulnerability in maven package io.jenkins.plugins:macstadium-orka
CVE-2021-3757 Vulnerability in npm package immer
CVE-2021-23342 Vulnerability in maven package org.webjars.npm:docsify