XML External Entity injection in iText



Published: 2017-11-08 | Updated: 2020-07-18
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9096
CWE-ID CWE-611
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
iText
Universal components / Libraries / Libraries used by multiple products

Vendor iText Group NV

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) XML External Entity injection

EUVDB-ID: #VU31399

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9096

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML external entity (XXE) attacks via a crafted PDF.

Mitigation

Install update from vendor's website.

Vulnerable software versions

iText: 5.5.0 - 5.5.11

External links

http://www.securityfocus.com/archive/1/541483/100/0/threaded
http://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
http://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_external_entity_attack.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###