{"containers":{"cna":{"affected":[{"product":"Orca HCM","vendor":"Learningdigital.com, Inc.","versions":[{"lessThanOrEqual":"10.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2021-07-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"The specific parameter of upload function of the Orca HCM digital learning platform does not filter file format, which allows remote unauthenticated attackers to upload files containing malicious script to execute RCE attacks."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-07-19T11:55:37.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-4923-d68e6-1.html"},{"tags":["x_refsource_MISC"],"url":"https://www.chtsecurity.com/news/ba7b3ae7-14f3-4970-b3f6-4d97d8c7ea25"}],"solutions":[{"lang":"en","value":"Update Orca HCM to version 10.9"}],"source":{"advisory":"TVN-202107004","discovery":"EXTERNAL"},"title":"Learningdigital.com, Inc. Orca HCM - Unrestricted Upload of File with Dangerous Type","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2021-07-19T11:36:00.000Z","ID":"CVE-2021-35963","STATE":"PUBLIC","TITLE":"Learningdigital.com, Inc. Orca HCM - Unrestricted Upload of File with Dangerous Type"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Orca HCM","version":{"version_data":[{"version_affected":"<=","version_value":"10.0"}]}}]},"vendor_name":"Learningdigital.com, Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The specific parameter of upload function of the Orca HCM digital learning platform does not filter file format, which allows remote unauthenticated attackers to upload files containing malicious script to execute RCE attacks."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-4923-d68e6-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-4923-d68e6-1.html"},{"name":"https://www.chtsecurity.com/news/ba7b3ae7-14f3-4970-b3f6-4d97d8c7ea25","refsource":"MISC","url":"https://www.chtsecurity.com/news/ba7b3ae7-14f3-4970-b3f6-4d97d8c7ea25"}]},"solution":[{"lang":"en","value":"Update Orca HCM to version 10.9"}],"source":{"advisory":"TVN-202107004","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T00:47:43.114Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-4923-d68e6-1.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.chtsecurity.com/news/ba7b3ae7-14f3-4970-b3f6-4d97d8c7ea25"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2021-35963","datePublished":"2021-07-19T11:55:38.082Z","dateReserved":"2021-06-30T00:00:00.000Z","dateUpdated":"2024-09-17T01:41:56.794Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}