An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter. NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server."
References
| Link | Resource |
|---|---|
| https://blog.certimetergroup.com/it/articolo/security/smartclient-v12-xml-external-entity--cve-2020-9352 | Exploit Third Party Advisory |
| https://seclists.org/fulldisclosure/2020/Feb/18 | Exploit Mailing List Third Party Advisory |
| https://www-demos.smartclient.com/smartclient-12.0/isomorphic/system/reference/?id=group..toolsDeployment |
Configurations
History
No history.
Information
Published : 2020-02-23 02:15
Updated : 2024-05-17 01:51
NVD link : CVE-2020-9352
Mitre link : CVE-2020-9352
CVE.ORG link : CVE-2020-9352
JSON object : View
Products Affected
smartclient
- smartclient
CWE
CWE-611
Improper Restriction of XML External Entity Reference
