#VU7320 XXE attack in OSCI-Transport Library


Published: 2017-07-05

Vulnerability identifier: #VU7320

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-10670

CWE-ID: CWE-611

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OSCI-Transport Library
Universal components / Libraries / Libraries used by multiple products

Vendor: KoSIT

Description
The vulnerability allows a remote attacker to conduct XXE attack.

The weakness exists in the encryption library due to improper handling of XML External Entity (XXE) entries when parsing an XML file. A remote attacker can send manipulated XML data to any communication partner and read arbitrary files from the file system of the victim host or cause DoS condition.

Successful exploitation of the vulnerability may result in information disclosure or denial of service.

Mitigation
Update to version 1.7.1.

Vulnerable software versions

OSCI-Transport Library: 1.6.1


External links
http://blog.sec-consult.com/2017/06/german-e-government-details-vulnerabilities.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability