An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. The RSS To SMS module processes XML files in an unsafe manner. This opens the application to an XML External Entity attack that can be used to perform SSRF or read arbitrary local files.
References
Link | Resource |
---|---|
http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway | Exploit Third Party Advisory |
http://www.ozeki.hu/index.php?owpn=231 | Vendor Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ozeki.hu/index.php?owpn=231 - Vendor Advisory | |
References | () https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-14029-XXE-Ozeki%20SMS%20Gateway - Exploit, Third Party Advisory |
Information
Published : 2020-09-18 18:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14029
Mitre link : CVE-2020-14029
CVE.ORG link : CVE-2020-14029
JSON object : View
Products Affected
ozeki
- ozeki_ng_sms_gateway
CWE
CWE-611
Improper Restriction of XML External Entity Reference