Raritan CommandCenter Secure Gateway XML Injection

2019.11.16
Credit: Okan Coskun
Risk: High
Local: No
Remote: Yes
CWE: CWE-611


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

I. VULNERABILITY ------------------------- Raritan CommandCenter Secure Gateway XML External Entity II. CVE REFERENCE ------------------------- CVE-2018-20687 III. VENDOR ------------------------- https://www.raritan.com/support/product/commandcenter-secure-gateway IV. TIMELINE ------------------------ 04/01/2019 Vulnerability discovered 07/01/2019 Vendor contacted V. CREDIT ------------------------- Okan Coşkun from Biznet Bilisim A.S. Faruk Ünal From Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Raritan CommandCenter Secure Gateway version prior 8.0.0 affected by XXE. A remote unauthenticated attacker may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts by using this vulnerability. Vulnerable path: /CommandCenterWebServices/.* VII. SOLUTION ------------------------- Update current CommandCenter Secure Gateway VIII. REFERENCES ------------------------- You can find more information about XXE from the link below: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top