A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1693 | Issue Tracking Vendor Advisory |
https://github.com/spacewalkproject/spacewalk/commit/74e28ec61d916c42061ef4347121650a1c962b0c | Patch |
https://zeroauth.ltd/blog/2020/02/18/proof-of-concept-exploit-for-cve-2020-1693-spacewalk/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-02-17 20:15
Updated : 2024-02-28 17:28
NVD link : CVE-2020-1693
Mitre link : CVE-2020-1693
CVE.ORG link : CVE-2020-1693
JSON object : View
Products Affected
redhat
- spacewalk
CWE
CWE-611
Improper Restriction of XML External Entity Reference