Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2r5q-g9p8-3977

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.

In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.

EPSS

Процентиль: 65%
0.00491
Низкий

Связанные уязвимости

CVSS3: 8.2
nvd
больше 5 лет назад

In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.

EPSS

Процентиль: 65%
0.00491
Низкий