CVE-2023-34088

8.7 HIGH

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in Collabora Online allows attackers to create documents with malicious names containing JavaScript payloads. When administrators view the history page in the admin console, the unescaped document name executes in their browser context, potentially leaking their JSON web token (JWT) used for websocket connections. This affects all Collabora Online instances running vulnerable versions before the patched releases.

💻 Affected Systems

Products:
  • Collabora Online
Versions: All versions prior to 22.05.13, 21.11.9.1, and 6.4.27
Operating Systems: All platforms running Collabora Online
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to the admin console history page for exploitation. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator JWT token theft leading to full administrative compromise of the Collabora Online instance, potentially enabling further attacks on the infrastructure or data exfiltration.

🟠

Likely Case

Administrator session hijacking allowing unauthorized access to administrative functions and sensitive document management operations.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, though administrative access could still be temporarily compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires creating a document with malicious name and waiting for administrator to view history page. No authentication bypass needed for initial document creation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.05.13, 21.11.9.1, or 6.4.27

Vendor Advisory: https://github.com/CollaboraOnline/online/security/advisories/GHSA-7582-pwfh-3pwr

Restart Required: Yes

Instructions:

1. Backup your Collabora Online configuration and data. 2. Stop the Collabora Online service. 3. Update to version 22.05.13 or higher, 21.11.9.1 or higher, or 6.4.27 or higher. 4. Restart the Collabora Online service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Document Creation

all

Limit document creation to trusted users only and implement document name validation to reject suspicious characters.

Admin Console Access Restriction

all

Restrict access to the admin console history page or implement additional authentication requirements for administrative functions.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in document names
  • Disable or restrict access to the admin console history page functionality

🔍 How to Verify

Check if Vulnerable:

Check your Collabora Online version. If it's below 22.05.13, 21.11.9.1, or 6.4.27, you are vulnerable.

Check Version:

Check Collabora Online web interface admin panel or consult installation documentation for version checking method.

Verify Fix Applied:

After patching, verify the version is 22.05.13 or higher, 21.11.9.1 or higher, or 6.4.27 or higher. Test that document names are properly escaped in the admin console history page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual document creation patterns with special characters in names
  • Multiple failed attempts to access admin console

Network Indicators:

  • Unexpected websocket connections using administrator tokens
  • Outbound connections to suspicious domains from admin console

SIEM Query:

Document creation events with payload-like strings in name field OR admin console access followed by external network connections

🔗 References

📤 Share & Export