#VU24767 XML External Entity injection in WebSphere Deployer - CVE-2020-2108

 

#VU24767 XML External Entity injection in WebSphere Deployer - CVE-2020-2108

Published: January 30, 2020


Vulnerability identifier: #VU24767
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-2108
CWE-ID: CWE-611
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
WebSphere Deployer
Software vendor:
Jenkins

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote user with Job/Configure permissions can pass a specially crafted war file containing a "WEB-INF/ibm-web-ext.xml" which is parsed by the plugin and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links