CVE-2020-1693

A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:spacewalk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.6
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 - Issue Tracking, Vendor Advisory
References () https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c - Patch () https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c - Patch
References () https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ - Exploit, Third Party Advisory () https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ - Exploit, Third Party Advisory

Information

Published : 2020-02-17 20:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1693

Mitre link : CVE-2020-1693

CVE.ORG link : CVE-2020-1693


JSON object : View

Products Affected

redhat

  • spacewalk
CWE
CWE-611

Improper Restriction of XML External Entity Reference