vendor:
Castor Library
by:
SecurityFocus
7,5
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: Castor Library
Affected Version From: 1.3.3-RC1
Affected Version To: 1.3.3-RC1
Patch Exists: NO
Related CWE: N/A
CPE: a:castor:castor:1.3.3-rc1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013
Castor Library Information Disclosure Vulnerability
An attacker can exploit this issue to gain access to sensitive information that may lead to further attacks. This is done by taking in external XML data from a user controllable location and passing it through an unmarshalling function, which can be used to view local resources on the application’s hosting server.
Mitigation:
Ensure that user-supplied input is properly validated and sanitized before being passed to the unmarshalling function.