S3 Browser before 8.1.5 contains an XML external entity (XXE) vulnerability, allowing remote attackers to read arbitrary files and obtain NTLMv2 hash values by tricking a user into connecting to a malicious server via the S3 protocol.
References
Link | Resource |
---|---|
https://s3browser.com/news.aspx | Release Notes Vendor Advisory |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-34/ | Third Party Advisory |
https://s3browser.com/news.aspx | Release Notes Vendor Advisory |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-34/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://s3browser.com/news.aspx - Release Notes, Vendor Advisory | |
References | () https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-34/ - Third Party Advisory |
Information
Published : 2018-12-19 17:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20298
Mitre link : CVE-2018-20298
CVE.ORG link : CVE-2018-20298
JSON object : View
Products Affected
s3browser
- s3_browser
CWE
CWE-611
Improper Restriction of XML External Entity Reference