A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890)
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-048/ | vdb entry third party advisory |