vendor:
WebInspect
by:
Jakub Palaczynski
7.5
CVSS
HIGH
XML External Entity
611
CWE
Product Name: WebInspect
Affected Version From: 10.4
Affected Version To: 7.x
Patch Exists: YES
Related CWE: CVE-2015-2125
CPE: a:hewlett_packard:webinspect
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2015
HP WebInspect – XML External Entity
A website was created that exploits the vulnerability by using an OOB technique. The website contains a hidden input field with a payload that contains an XML External Entity. The entity references a file on the attacker's host which specifies which file should be retrieved from the remote host and where the content of that file should be sent. Another website was created that steals hashes of the Administrator user. The attacker needs to start a tool on the server that captures hashes. The exploit is triggered while profiling or scanning the created application using vulnerable versions of HP WebInspect.
Mitigation:
Upgrade to the latest version of HP WebInspect to mitigate this vulnerability.