lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAN++2UxY-8qH4XKRswykuv5JaTaVxD=G7TM7Bbg5iG-2SM78gg@mail.gmail.com> Date: Thu, 14 Nov 2019 22:25:06 +0300 From: okan coskun <okancoskun2@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Raritan CommandCenter Secure Gateway XML External Entity < 8.0 I. VULNERABILITY ------------------------- Raritan CommandCenter Secure Gateway XML External Entity II. CVE REFERENCE ------------------------- CVE-2018-20687 III. VENDOR ------------------------- https://www.raritan.com/support/product/commandcenter-secure-gateway IV. TIMELINE ------------------------ 04/01/2019 Vulnerability discovered 07/01/2019 Vendor contacted V. CREDIT ------------------------- Okan Coşkun from Biznet Bilisim A.S. Faruk Ünal From Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- Raritan CommandCenter Secure Gateway version prior 8.0.0 affected by XXE. A remote unauthenticated attacker may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts by using this vulnerability. Vulnerable path: /CommandCenterWebServices/.* VII. SOLUTION ------------------------- Update current CommandCenter Secure Gateway VIII. REFERENCES ------------------------- You can find more information about XXE from the link below: https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists