CVE-2021-41810

5.2 MEDIUM

📋 TL;DR

This vulnerability allows stored script injection in M-Files Admin versions before 22.2.11051.0. An authenticated vault administrator can store malicious scripts in configuration data that may be executed by other administrators. Only affects users with vault admin privileges and cannot be exploited remotely.

💻 Affected Systems

Products:
  • M-Files Admin
Versions: All versions before 22.2.11051.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires vault administrator authentication. Not exploitable remotely.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious vault administrator could inject scripts that compromise the admin tool, potentially leading to privilege escalation, data theft, or further system compromise within the vault environment.

🟠

Likely Case

An authenticated malicious vault administrator could execute arbitrary scripts within the admin tool, potentially modifying vault configurations, accessing sensitive data, or disrupting operations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized vault administrators only, reducing risk to data integrity within the vault.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires vault administrator credentials and access to the M-Files Admin tool.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.2.11051.0 and later

Vendor Advisory: https://empower.m-files.com/security-advisories/CVE-2021-41810

Restart Required: Yes

Instructions:

1. Download M-Files Admin version 22.2.11051.0 or later from official M-Files sources. 2. Install the update following vendor instructions. 3. Restart the M-Files Admin tool and verify the version.

🔧 Temporary Workarounds

Restrict Vault Administrator Access

all

Limit the number of users with vault administrator privileges to only those who absolutely need it.

Monitor Configuration Changes

all

Implement logging and monitoring for configuration changes made through the M-Files Admin tool.

🧯 If You Can't Patch

  • Implement strict access controls to limit vault administrator accounts to trusted personnel only.
  • Enable detailed logging of all configuration changes and script executions within the M-Files Admin tool.

🔍 How to Verify

Check if Vulnerable:

Check the M-Files Admin version in the application's About dialog or settings. If version is below 22.2.11051.0, the system is vulnerable.

Check Version:

Check via M-Files Admin interface: Help > About M-Files Admin

Verify Fix Applied:

Verify the M-Files Admin version is 22.2.11051.0 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration changes in M-Files Admin logs
  • Script execution events in admin tool logs
  • Multiple failed authentication attempts followed by successful vault admin login

Network Indicators:

  • None - this is not a network-based vulnerability

SIEM Query:

Search for events where user with vault admin privileges makes configuration changes containing script-like patterns in M-Files logs.

🔗 References

📤 Share & Export