A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890)
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-048/ | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-048/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-21-048/ - Third Party Advisory, VDB Entry |
Information
Published : 2021-01-12 21:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26981
Mitre link : CVE-2020-26981
CVE.ORG link : CVE-2020-26981
JSON object : View
Products Affected
siemens
- jt2go
- teamcenter_visualization
CWE
CWE-611
Improper Restriction of XML External Entity Reference