PrinceXML, versions 10 and below, is vulnerable to XXE due to the lack of protection against external entities. If an attacker passes HTML referencing an XML file (e.g., in an IFRAME element), PrinceXML will fetch the XML and parse it, thus giving an attacker file-read access and full-fledged SSRF.
References
Link | Resource |
---|---|
https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ | Exploit Third Party Advisory |
https://www.lynxsecurity.io/ | Third Party Advisory |
https://www.youtube.com/watch?v=-7YIzYtWhzM | Exploit Third Party Advisory |
https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ | Exploit Third Party Advisory |
https://www.lynxsecurity.io/ | Third Party Advisory |
https://www.youtube.com/watch?v=-7YIzYtWhzM | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ - Exploit, Third Party Advisory | |
References | () https://www.lynxsecurity.io/ - Third Party Advisory | |
References | () https://www.youtube.com/watch?v=-7YIzYtWhzM - Exploit, Third Party Advisory |
Information
Published : 2019-01-30 15:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19858
Mitre link : CVE-2018-19858
CVE.ORG link : CVE-2018-19858
JSON object : View
Products Affected
princexml
- princexml
CWE
CWE-611
Improper Restriction of XML External Entity Reference