cve/2020/CVE-2020-7032.md

24 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7032)
![](https://img.shields.io/static/v1?label=Product&message=System%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WebLM&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.07.1.3.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brighgreen)
### Description
An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2.
### POC
#### Reference
- http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html
2024-05-25 21:48:12 +02:00
- http://seclists.org/fulldisclosure/2020/Nov/31
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2020/Nov/31
2024-05-25 21:48:12 +02:00
- https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/
2024-06-09 00:33:16 +00:00
- https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-7032