CVE-2018-19858

PrinceXML, versions 10 and below, is vulnerable to XXE due to the lack of protection against external entities. If an attacker passes HTML referencing an XML file (e.g., in an IFRAME element), PrinceXML will fetch the XML and parse it, thus giving an attacker file-read access and full-fledged SSRF.
References
Link Resource
https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ Exploit Third Party Advisory
https://www.lynxsecurity.io/ Third Party Advisory
https://www.youtube.com/watch?v=-7YIzYtWhzM Exploit Third Party Advisory
https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ Exploit Third Party Advisory
https://www.lynxsecurity.io/ Third Party Advisory
https://www.youtube.com/watch?v=-7YIzYtWhzM Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:princexml:princexml:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:58

Type Values Removed Values Added
References () https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ - Exploit, Third Party Advisory () https://hacking.us.com/blog/XSS-to-XXE-in-Prince/ - Exploit, Third Party Advisory
References () https://www.lynxsecurity.io/ - Third Party Advisory () https://www.lynxsecurity.io/ - Third Party Advisory
References () https://www.youtube.com/watch?v=-7YIzYtWhzM - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=-7YIzYtWhzM - Exploit, Third Party Advisory

Information

Published : 2019-01-30 15:29

Updated : 2024-11-21 03:58


NVD link : CVE-2018-19858

Mitre link : CVE-2018-19858

CVE.ORG link : CVE-2018-19858


JSON object : View

Products Affected

princexml

  • princexml
CWE
CWE-611

Improper Restriction of XML External Entity Reference