XML External Entity injection in Spacewalk - CVE-2020-1693

 

XML External Entity injection in Spacewalk - CVE-2020-1693

Published: February 18, 2020


Vulnerability identifier: #VU25419
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-1693
CWE-ID: CWE-611
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Red Hat Inc.
Affected software:
Spacewalk

Detailed vulnerability description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied XML input in the "/rpc/api" endpoint. A remote attacker can pass a specially crafted XML code to the affected application, retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.


How to mitigate CVE-2020-1693

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources