Raritan CommandCenter Secure Gateway XML Injection

2019.11.16
Credit: Okan Coskun
Risk: High
Local: No
Remote: Yes
CWE: CWE-611


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

I. VULNERABILITY ------------------------- Raritan CommandCenter Secure Gateway XML External Entity II. CVE REFERENCE ------------------------- CVE-2018-20687 III. VENDOR ------------------------- https://www.raritan.com/support/product/commandcenter-secure-gateway IV. TIMELINE ------------------------ 04/01/2019 Vulnerability discovered 07/01/2019 Vendor contacted V. CREDIT ------------------------- Okan Coşkun from Biznet Bilisim A.S. Faruk Ünal From Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Raritan CommandCenter Secure Gateway version prior 8.0.0 affected by XXE. A remote unauthenticated attacker may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts by using this vulnerability. Vulnerable path: /CommandCenterWebServices/.* VII. SOLUTION ------------------------- Update current CommandCenter Secure Gateway VIII. REFERENCES ------------------------- You can find more information about XXE from the link below: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top