CVE-2021-42727

Adobe Bridge 11.1.1 (and earlier) is affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Bridge.
References
Link Resource
https://helpx.adobe.com/security/products/bridge/apsb21-94.html Not Applicable Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

06 Apr 2022, 14:25

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 7.8
v2 : 9.3
v3 : 7.8
CWE CWE-120 CWE-787
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Not Applicable, Vendor Advisory

16 Mar 2022, 15:15

Type Values Removed Values Added
CWE CWE-22 CWE-120
References
  • {'url': 'https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html', 'name': 'https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html -
Summary Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can send an HTTP POST request which will place a malicious .jsp file in the folder 'C:\Program Files\Adobe\Adobe RoboHelp Server 11\admin' to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server. Adobe Bridge 11.1.1 (and earlier) is affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Bridge.

28 Jan 2022, 22:15

Type Values Removed Values Added
Summary Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can upload arbitrary files outside of the intended directory to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server. Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can send an HTTP POST request which will place a malicious .jsp file in the folder 'C:\Program Files\Adobe\Adobe RoboHelp Server 11\admin' to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server.

24 Nov 2021, 20:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : 6.8
v3 : 7.8
References (MISC) https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html - (MISC) https://helpx.adobe.com/security/products/robohelp-server/apsb21-87.html - Vendor Advisory
CPE cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

22 Nov 2021, 16:36

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-22 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-42727

Mitre link : CVE-2021-42727

CVE.ORG link : CVE-2021-42727


JSON object : View

Products Affected

microsoft

  • windows

adobe

  • robohelp_server
CWE
CWE-787

Out-of-bounds Write