Executive Summary

Summary
Title Granite Data Services AMF framework fails to properly parse XML input containing a reference to external entities
Informations
NameVU#279472First vendor Publication2016-03-24
VendorVU-CERTLast vendor Modification2016-03-24
Severity (Vendor) N/ARevisionM

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:N/A:P)
Cvss Base Score5.5Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#279472

Granite Data Services AMF framework fails to properly parse XML input containing a reference to external entities

Original Release date: 24 Mar 2016 | Last revised: 24 Mar 2016

Overview

Granite Data Services version 3.1.1-SNAPSHOT AMF framework is vulnerable to XML external entity (XXE) attack that may be leveraged to expose sensitive data on the host..

Description

CWE-611 - Improper Restriction of XML External Entity Reference ('XXE') - CVE-2016-2340

Granite Data Services provides event driven, cross-framework application that can be found on Github (https://github.com/graniteds/graniteds). Granite Data Services (http://www.graniteds.org/) provides server and client libraries that can be used to connect desktop and mobile applications to a server using the Action Message Format (AMF3) or Java Media Framework (JMF) serialization protocols.

Granite Data Services version 3.1.1-SNAPSHOT AMF framework is vulnerable to a XML external entity (XXE) attack. A XXE attacks how an application parses XML input. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.

Impact

A vulnerable server would allow a remote user access to sensitive data or cause a denial of service.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Vendor Information (Learn More)

No information available. If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base4.3AV:L/AC:L/Au:S/C:P/I:P/A:P
Temporal3.5E:POC/RL:ND/RC:UC
Environmental1.4CDP:LM/TD:L/CR:M/IR:M/AR:M

References

  • http://codewhitesec.blogspot.com/2015/08/cve-2015-3269-apache-flex-blazeds-xxe.html
  • https://www.owasp.org/index.php/XML_External_Entity_%28XXE%29_Processing

Credit

Thanks to Travis Emmert for reporting this vulnerability.

This document was written by Kyle O'Meara.

Other Information

  • CVE IDs:CVE-2016-2340
  • Date Public:24 Mar 2016
  • Date First Published:24 Mar 2016
  • Date Last Updated:24 Mar 2016
  • Document Revision:26

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/279472

CWE : Common Weakness Enumeration

%idName
100 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Application1
Application5

Information Assurance Vulnerability Management (IAVM)

DateDescription
2015-09-03IAVM : 2015-A-0205 - Adobe Cold Fusion Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0061363
2015-08-20IAVM : 2015-B-0102 - Adobe LiveCycle Data Services Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0061331

Nessus® Vulnerability Scanner

DateDescription
2016-03-09Name : The remote host is affected by an external entity injection vulnerability.
File : hp_operations_manager_i_hpsbgn03550.nasl - Type : ACT_GATHER_INFO
2015-12-22Name : The remote host has a virtualization management application installed that is...
File : vmware_vcenter_vmsa-2015-0008.nasl - Type : ACT_GATHER_INFO
2015-09-03Name : A web-based application running on the remote Windows host is affected by an ...
File : coldfusion_win_apsb15-21.nasl - Type : ACT_GATHER_INFO
2015-04-13Name : The remote Windows host has an application installed that is affected by mult...
File : vmware_horizon_view_VMSA-2015-0003.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2017-04-07 09:23:17
  • Multiple Updates
2016-03-29 05:29:04
  • Multiple Updates
2016-03-26 00:27:07
  • Multiple Updates
2016-03-24 17:22:19
  • First insertion