CVE-2020-7032

An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:avaya:weblm:*:*:*:*:*:*:*:*
cpe:2.3:a:avaya:weblm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Nov/31 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Nov/31 - Exploit, Mailing List, Third Party Advisory
References () https://downloads.avaya.com/css/P8/documents/101072249 - Vendor Advisory () https://downloads.avaya.com/css/P8/documents/101072249 - Vendor Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ - Exploit, Third Party Advisory

Information

Published : 2020-11-13 01:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7032

Mitre link : CVE-2020-7032

CVE.ORG link : CVE-2020-7032


JSON object : View

Products Affected

avaya

  • aura_system_manager
  • weblm
CWE
CWE-611

Improper Restriction of XML External Entity Reference