CVE-2022-47418 – LogicalDOC Document Version Comment Stored XSS
https://notcve.org/view.php?id=CVE-2022-47418
07 Feb 2023 — LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document version comments. • https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-47417 – LogicalDOC Document File Name Stored XSS
https://notcve.org/view.php?id=CVE-2022-47417
07 Feb 2023 — LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document file name. • https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-47416 – LogicalDOC Chat Stored XSS
https://notcve.org/view.php?id=CVE-2022-47416
07 Feb 2023 — LogicalDOC Enterprise is vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app chat system. • https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-47415 – LogicalDOC Messaging Stored XSS
https://notcve.org/view.php?id=CVE-2022-47415
07 Feb 2023 — LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app messaging system (both subject and message bodies). • https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-13542
https://notcve.org/view.php?id=CVE-2020-13542
03 Dec 2020 — A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges. Se presenta una vulnerabilidad de escalada de privilegios local en los permisos del sistema de archivos de la instalación de LogicalDoc versión 8.5.1. Dependiendo del vecto... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 • CWE-276: Incorrect Default Permissions •
CVE-2020-10366
https://notcve.org/view.php?id=CVE-2020-10366
07 Apr 2020 — LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365. LogicalDoc versiones anteriores a 8.3.3, permite un Salto de Directorio del archivo /servlet.gupld, una vulnerabilidad diferente de CVE-2020-9423 y CVE-2020-10365. • https://sourceforge.net/p/logicaldoc/code/HEAD/tree/community/logicaldoc/trunk/ReleaseNotes.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-10365
https://notcve.org/view.php?id=CVE-2020-10365
18 Mar 2020 — LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This list could be filtered by modifying some of the parameters. Some of them are not properly sanitized which could allow an authenticated attacker to perform arbitrary queries to the database. LogicalDoc versiones anteriores a 8.3.3, permite una Inyección SQL. • https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2020-9423
https://notcve.org/view.php?id=CVE-2020-9423
18 Mar 2020 — LogicalDoc before 8.3.3 could allow an attacker to upload arbitrary files, leading to command execution or retrieval of data from the database. LogicalDoc provides a functionality to add documents. Those documents could then be used for multiple tasks, such as version control, shared among users, applying tags, etc. This functionality could be abused by an unauthenticated attacker to upload an arbitrary file in a restricted folder. This would lead to the executions of malicious commands with root privileges... • https://www.coresecurity.com/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2019-9723
https://notcve.org/view.php?id=CVE-2019-9723
30 May 2019 — LogicalDOC Community Edition 8.x before 8.2.1 has a path traversal vulnerability that allows reading arbitrary files and the creation of directories, in the class PluginRegistry. LogicalDOC Community Edition 8.x versión anterior de 8.2.1 tiene una vulnerabilidad de recorrido de ruta que permite leer archivos arbitrarios y la creación de directorios, en la clase PluginRegistry. • https://blog.ripstech.com/2019/logicaldoc-path-traversal • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2017-1000021
https://notcve.org/view.php?id=CVE-2017-1000021
13 Jul 2017 — LogicalDoc Community Edition 7.5.3 and prior is vulnerable to XXE when indexing XML documents. LogicalDoc Community Edition versión 7.5.3 y anteriores son vulnerable a ataques de tipo XXE durante el indexado de documentos XML. • http://blog.randorisec.fr/logicaldoc-from-guest-to-root • CWE-611: Improper Restriction of XML External Entity Reference •