An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE vulnerability is blind since the response doesn't directly display a requested file, but rather returns it inside the name data field when the report is saved. An attacker is able to view restricted operating system files. This issue affects all types of users: administrators or normal users.
References
Link | Resource |
---|---|
https://www.tufin.com/ | Vendor Advisory |
https://forum.tufin.com/support/kc/latest/ | Vendor Advisory |
https://www.exploit-db.com/exploits/45808 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-06-19 09:15
Updated : 2019-06-24 05:29
NVD link : CVE-2018-18406
Mitre link : CVE-2018-18406
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
tufin
- securetrack
- tufinos