CVE-2021-20838

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to conduct XML External Entity (XXE) attacks against Office Server Document Converter, potentially causing denial of service (DoS) conditions. It affects users of Office Server Document Converter V7.2MR4 and earlier, and V7.1MR7 and earlier, who process XML documents through the vulnerable software.

💻 Affected Systems

Products:
  • Office Server Document Converter
Versions: V7.2MR4 and earlier, V7.1MR7 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations processing XML documents are vulnerable. The vulnerability exists in the XML parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through DoS, potential information disclosure via XXE, and possible server-side request forgery (SSRF) leading to internal network reconnaissance.

🟠

Likely Case

Denial of service causing document conversion services to become unavailable, disrupting business workflows that rely on this functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation, though service disruption remains possible.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit this, but requires network access to the vulnerable service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood and typically easy to exploit with standard XXE payloads. The unauthenticated nature lowers the barrier to exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V7.2MR5 and later, V7.1MR8 and later

Vendor Advisory: https://www.antenna.co.jp/news/2021/osdc72-20211027.html

Restart Required: Yes

Instructions:

1. Download the latest version from Antenna House website. 2. Backup current configuration. 3. Install the updated version. 4. Restart the Office Server Document Converter service. 5. Verify functionality with test documents.

🔧 Temporary Workarounds

Disable external entity processing

all

Configure XML parser to disable external entity resolution

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, DISALLOW_DOCTYPE_DECL=true

Input validation filtering

all

Implement XML input validation to reject documents with DOCTYPE declarations

Use XML schema validation or regex filtering for DOCTYPE declarations

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to the document converter service
  • Deploy a web application firewall (WAF) with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check the software version via administrative interface or configuration files. Versions V7.2MR4 or earlier, or V7.1MR7 or earlier are vulnerable.

Check Version:

Check the software version in the administration console or configuration files (version.txt or similar)

Verify Fix Applied:

Verify installation of V7.2MR5 or later, or V7.1MR8 or later. Test with known safe XML documents to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed XML parsing attempts
  • Unusual XML document processing errors
  • Increased memory/CPU usage during XML processing

Network Indicators:

  • Unusual XML document uploads to document converter endpoints
  • External entity resolution attempts in network traffic

SIEM Query:

source="document_converter" AND (error="XML parsing" OR error="DOCTYPE")

🔗 References

📤 Share & Export