An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2.
References
Link | Resource |
---|---|
https://downloads.avaya.com/css/P8/documents/101072249 | Vendor Advisory |
http://seclists.org/fulldisclosure/2020/Nov/31 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html | Exploit Third Party Advisory VDB Entry |
https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-11-12 17:15
Updated : 2022-10-19 07:39
NVD link : CVE-2020-7032
Mitre link : CVE-2020-7032
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
avaya
- weblm
- aura_system_manager