vendor:
Episerver
by:
Jonas Lejon
7.5
CVSS
HIGH
XML External Entity Injection
611
CWE
Product Name: Episerver
Affected Version From: Episerver 7 patch 4 and below
Affected Version To: Episerver 7 patch 4 and below
Patch Exists: NO
Related CWE: N/A
CPE: a:episerver:episerver
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Episerver 7 patch 4 – XML External Entity Injection
Episerver 7 patch 4 and below is vulnerable to XML External Entity Injection. The exploit starts a listening webserver, so the exploits needs a public IP and unfiltered port. The malicious DTD file is sent to the target which contains the EXFIL_FILE and RHOST. The exploit then sends a POST request with an XML payload containing the malicious DTD file. The target then sends the exfiltrated data to the webserver which is then printed out.
Mitigation:
Ensure that the application is not vulnerable to XML External Entity Injection by validating the XML input.