Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-16188

Опубликовано: 25 сент. 2019
Источник: nvd
CVSS3: 7.1
CVSS2: 5.8
EPSS Низкий

Описание

HCL AppScan Source before 9.03.13 is susceptible to XML External Entity (XXE) attacks in multiple locations. In particular, an attacker can send a specially crafted .ozasmt file to a targeted victim and ask the victim to open it. When the victim imports the .ozasmt file in AppScan Source, the content of any file in the local file system (to which the victim as read access) can be exfiltrated to a remote listener under the attacker's control. The product does not disable external XML Entity Processing, which can lead to information disclosure and denial of services attacks.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:hcltech:appscan_source:*:*:*:*:*:*:*:*
Версия до 9.03.13 (исключая)

EPSS

Процентиль: 36%
0.00149
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.1
github
больше 3 лет назад

HCL AppScan Source before 9.03.13 is susceptible to XML External Entity (XXE) attacks in multiple locations. In particular, an attacker can send a specially crafted .ozasmt file to a targeted victim and ask the victim to open it. When the victim imports the .ozasmt file in AppScan Source, the content of any file in the local file system (to which the victim as read access) can be exfiltrated to a remote listener under the attacker's control. The product does not disable external XML Entity Processing, which can lead to information disclosure and denial of services attacks.

EPSS

Процентиль: 36%
0.00149
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-611