Skip to content

Arbitrary file write outside with malicious WOPI server

High
caolanm published GHSA-9j32-gg3j-8w25 Apr 15, 2025

Package

coolwsd

Affected versions

< 24.04.13.1
< 23.05.19
< 22.05.25

Patched versions

24.04.13.1
23.05.19
22.05.25

Description

### ### Impact

There was a path traversal flaw in handling the CheckFileInfo BaseFileName field returned from WOPI servers which allowed writing a file anywhere where the uid running Collabora Online can write if such a response was supplied by a malicious WOPI server. By combining this flaw with a Time of Check, Time of Use DNS lookup issue with a WOPI server address under attacker control it is possible to present such a response to be processed by a Collabora Online instance.

Patches

In versions, 24.04.12.4, 23.05.19, 22.05.25 or later the CheckFileInfo BaseFileName field is rejected if it does not confirm to the specification that requires it to not contain a path. An internal DNS cache was extended to give consistent results for back to back DNS lookups.

Credits

Thanks to truff - https://x.com/truffzor for reporting this flaw

Severity

High

CVE ID

CVE-2025-27791

Weaknesses

Credits