HCL AppScan Source before 9.03.13 is susceptible to XML External Entity (XXE) attacks in multiple locations. In particular, an attacker can send a specially crafted .ozasmt file to a targeted victim and ask the victim to open it. When the victim imports the .ozasmt file in AppScan Source, the content of any file in the local file system (to which the victim as read access) can be exfiltrated to a remote listener under the attacker's control. The product does not disable external XML Entity Processing, which can lead to information disclosure and denial of services attacks.
References
Link | Resource |
---|---|
https://hclpnpsupport.hcltech.com/csm?id=kb_article&sys_id=0812a9961b0c885077761fc58d4bcb06 | Patch Vendor Advisory |
https://hclpnpsupport.hcltech.com/csm?id=kb_article&sys_id=0812a9961b0c885077761fc58d4bcb06 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://hclpnpsupport.hcltech.com/csm?id=kb_article&sys_id=0812a9961b0c885077761fc58d4bcb06 - Patch, Vendor Advisory |
Information
Published : 2019-09-25 17:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16188
Mitre link : CVE-2019-16188
CVE.ORG link : CVE-2019-16188
JSON object : View
Products Affected
hcltech
- appscan_source
CWE
CWE-611
Improper Restriction of XML External Entity Reference