XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/68075 | third party advisory vdb entry |
https://support.zabbix.com/browse/ZBX-8151 | patch vendor advisory exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html | third party advisory vendor advisory |
http://seclists.org/fulldisclosure/2014/Jun/87 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1110496 | third party advisory issue tracking |
https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273 | third party advisory exploit |