A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 | Issue Tracking Vendor Advisory |
https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c | Patch |
https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 | Issue Tracking Vendor Advisory |
https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c | Patch |
https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 8.6 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c - Patch | |
References | () https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ - Exploit, Third Party Advisory |
Information
Published : 2020-02-17 20:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1693
Mitre link : CVE-2020-1693
CVE.ORG link : CVE-2020-1693
JSON object : View
Products Affected
redhat
- spacewalk
CWE
CWE-611
Improper Restriction of XML External Entity Reference