XML external entity (XXE) vulnerability in the XACML flow feature in WSO2 Identity Server 5.1.0 before WSO2-CARBON-PATCH-4.4.0-0231 allows remote authenticated users with access to XACML features to read arbitrary files, cause a denial of service, conduct server-side request forgery (SSRF) attacks, or have unspecified other impact via a crafted XACML request to entitlement/eval-policy-submit.jsp. NOTE: this issue can be combined with CVE-2016-4311 to exploit the vulnerability without credentials.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/40239/ | exploit vdb entry third party advisory |
http://www.securityfocus.com/archive/1/539199/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/92485 | vdb entry third party advisory |
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2016-0096 | patch vendor advisory |
http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt | third party advisory exploit |
http://packetstormsecurity.com/files/138329/WSO2-Identity-Server-5.1.0-XML-Injection.html | exploit vdb entry third party advisory |