CVE-2021-43820

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-43820
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43820.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-43820
Related
  • GHSA-m3wc-jv6r-hvv8
Published
2021-12-14T19:15:07Z
Modified
2025-01-14T10:00:39.951042Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any known library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.

References

Affected packages

Git / github.com/haiwen/seafile-server

Affected ranges

Type
GIT
Repo
https://github.com/haiwen/seafile-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

docs-1.*

docs-1.0.0
docs-1.0.1
docs-1.0.2
docs-1.0.3
docs-1.0.4
docs-1.1.0
docs-1.2.0

seatable-0.*

seatable-0.9.3
seatable-0.9.4
seatable-0.9.5
seatable-0.9.6
seatable-0.9.7
seatable-0.9.8

seatable-1.*

seatable-1.0.0
seatable-1.1.0
seatable-1.2.0
seatable-1.3.0
seatable-1.4.0
seatable-1.5.0
seatable-1.6.0
seatable-1.8.0

seatable-2.*

seatable-2.0.0
seatable-2.1.0
seatable-2.2.0
seatable-2.3.0
seatable-2.3.1
seatable-2.4.0
seatable-2.5.0
seatable-2.6.0
seatable-2.7.0
seatable-2.8.0

seatable-3.*

seatable-3.0.0

v6.*

v6.0.1-server
v6.0.10-server
v6.0.2-server
v6.0.3-server
v6.0.4-server
v6.0.5-server
v6.0.6-server
v6.0.7-server
v6.0.8-server
v6.0.9-server
v6.1.0-server
v6.1.1-server
v6.1.2-server
v6.2.0-server
v6.2.1-server
v6.2.2-server
v6.2.3-server
v6.2.4-server
v6.2.5-server
v6.3.0-server
v6.3.1-server
v6.3.2-server
v6.3.3-server
v6.3.4-server

v7.*

v7.0.0-server
v7.0.1-server
v7.0.2-server
v7.0.3-server
v7.0.4-server
v7.0.5-server
v7.1.0-server
v7.1.1-server
v7.1.2-server
v7.1.3-server
v7.1.4-server
v7.1.5-server

v8.*

v8.0.0-server
v8.0.1-server
v8.0.2-server
v8.0.3-server
v8.0.4-server
v8.0.5-server
v8.0.6-server
v8.0.7-server