Dell OpenManage Server Administrator 8.3 XXE
When using an XML parser on returned data by a remote node, OMSA does not restrict the use of external entities. This PoC first emulates a remote node (OMSA -> WS-Man -> this) and requests from the victim OMSA (this -> HTTPS -> OMSA) that it be managed. Next, the PoC requests (this -> HTTPS -> OMSA) a plugin that will attempt to parse returned XML, and when the OMSA instance requests this XML from the emulated node (OMSA -> WS-Man -> this), the PoC returns XML that includes a XXE attack, revealing the contents of /etc/redhat-release. Because OMSA merely requires you be authenticated to the node you are managing, which we control, authentication to the victim is not required to exploit this vulnerability.