The Java implementation of AMF3 deserializers used by WebORB for Java by Midnight Coders, version 5.1.1.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/307983 | Third Party Advisory US Government Resource |
https://codewhitesec.blogspot.com/2017/04/amf.html | Exploit Third Party Advisory |
http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution | Third Party Advisory |
http://www.securityfocus.com/bid/97384 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-06-11 10:29
Updated : 2018-08-06 08:38
NVD link : CVE-2017-3208
Mitre link : CVE-2017-3208
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
themidnightcoders
- weborb_for_java