NextApp Echo XML Parsing Information Disclosure Vulnerability

high Nessus Plugin ID 36017

Synopsis

The remote host is running a vulnerable web application that is affected by an XML injection vulnerability.

Description

The remote host is running a web application that uses Echo, a web framework written in Java.

The web application on the remote host uses a version of Echo that accepts unverified XML data from the client. A malicious client can use this to direct the server to arbitrary URIs, which could, in turn, allow the attacker to read locally-stored files.

Note that this vulnerability could also result in a denial of service or local network scanning.

Solution

Upgrade to Echo 2.1.1/3.0.b6 or later.

See Also

http://www.nessus.org/u?d492d37e

https://seclists.org/bugtraq/2009/Mar/96

http://echo.nextapp.com/site/node/5742

Plugin Details

Severity: High

ID: 36017

File Name: nextapp_echo_xxe.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 3/26/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Reference Information

BID: 34060

SECUNIA: 34218