CVE-2021-28684

The XML parser used in ConeXware PowerArchiver before 20.10.02 allows processing of external entities, which might lead to exfiltration of local files over the network (via an XXE attack).
References
Link Resource
https://peterka.tech/blog/posts/cve-2021-28684/ Exploit Third Party Advisory
https://www.powerarchiver.com Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:powerarchiver:powerarchiver:*:*:*:*:*:*:*:*

History

23 Jun 2021, 18:56

Type Values Removed Values Added
CPE cpe:2.3:a:powerarchiver:powerarchiver:*:*:*:*:*:*:*:*
References (MISC) https://peterka.tech/blog/posts/cve-2021-28684/ - (MISC) https://peterka.tech/blog/posts/cve-2021-28684/ - Exploit, Third Party Advisory
References (MISC) https://www.powerarchiver.com - (MISC) https://www.powerarchiver.com - Product
CWE CWE-611
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 4.3

21 Jun 2021, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-21 13:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-28684

Mitre link : CVE-2021-28684

CVE.ORG link : CVE-2021-28684


JSON object : View

Products Affected

powerarchiver

  • powerarchiver
CWE
CWE-611

Improper Restriction of XML External Entity Reference