CVE-2021-42727

Adobe Bridge 11.1.1 (and earlier) is affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Bridge.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Not Applicable, Vendor Advisory () https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Not Applicable, Vendor Advisory

06 Apr 2022, 14:25

Type Values Removed Values Added
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Not Applicable, Vendor Advisory
CVSS v2 : 6.8
v3 : 7.8
v2 : 9.3
v3 : 7.8
CWE CWE-120 CWE-787

16 Mar 2022, 15:15

Type Values Removed Values Added
References
  • {'url': 'https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html', 'name': 'https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html -
CWE CWE-22 CWE-120
Summary Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can send an HTTP POST request which will place a malicious .jsp file in the folder 'C:\Program Files\Adobe\Adobe RoboHelp Server 11\admin' to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server. Adobe Bridge 11.1.1 (and earlier) is affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Bridge.

28 Jan 2022, 22:15

Type Values Removed Values Added
Summary Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can upload arbitrary files outside of the intended directory to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server. Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can send an HTTP POST request which will place a malicious .jsp file in the folder 'C:\Program Files\Adobe\Adobe RoboHelp Server 11\admin' to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server.

24 Nov 2021, 20:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : 6.8
v3 : 7.8
References (MISC) https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html - (MISC) https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html - Vendor Advisory
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*

22 Nov 2021, 16:36

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-22 16:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-42727

Mitre link : CVE-2021-42727

CVE.ORG link : CVE-2021-42727


JSON object : View

Products Affected

adobe

  • robohelp_server

microsoft

  • windows
CWE
CWE-787

Out-of-bounds Write