Description
A flaw has been found in JSC R7 R7-Office Document Server up to 20250820. Impacted is an unknown function of the file /downloadas/. Executing manipulation of the argument cmd can lead to path traversal. The attack can be launched remotely. Upgrading to version 2025.3.1.923 is recommended to address this issue. The affected component should be upgraded. R7-Office is a fork of OpenOffice and at the moment it remains unclear if OpenOffice is affected as well. The OpenOffice team was not able to reproduce the issue in their codebase. The vendor replied: "We confirm that this vulnerability has been verified and patched in release 2025.3.1.923. During our security testing, it was not possible to exploit the issue - the server consistently returns proper error responses to the provided scenarios."
Es wurde eine Schwachstelle in JSC R7 R7-Office Document Server bis 20250820 entdeckt. Betroffen davon ist eine unbekannte Funktion der Datei /downloadas/. Die Manipulation des Arguments cmd führt zu path traversal. Umgesetzt werden kann der Angriff über das Netzwerk. Mit einem Upgrade auf Version 2025.3.1.923 lässt sich dieses Problem beheben. Ein Upgrade der betroffenen Komponente wird empfohlen.
Problem types
Product status
2025.3.1.923
Timeline
| 2025-09-21: | Advisory disclosed |
| 2025-09-21: | VulDB entry created |
| 2025-09-21: | VulDB entry last update |
Credits
ymka_1 (VulDB User)
References
vuldb.com/?id.325133 (VDB-325133 | JSC R7 R7-Office Document Server downloadas path traversal)
vuldb.com/?ctiid.325133 (VDB-325133 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.638446 (Submit #638446 | OnlyOffice document server ?-2024.1.1-375-?/<2025.3.1.923 Path Traversal: 'dir/../../filename')