Page 2 of 7 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An SSRF issue was discovered in Enghouse Web Chat 6.1.300.31. In any POST request, one can replace the port number at WebServiceLocation=http://localhost:8085/UCWebServices/ with a range of ports to determine what is visible on the internal network (as opposed to what general web traffic would see on the product's host). The response from open ports is different than from closed ports. The product does not allow one to change the protocol: anything except http(s) will throw an error; however, it is the type of error that allows one to determine if a port is open or not. Se descubrió un problema de tipo SSRF en Enghouse Web Chat versión 6.1.300.31. • https://mjlanders.com/2019/11/07/multiple-vulnerabilities-found-in-enghouse-zeacom-web-chat • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

ClientServiceConfigController.cs in Enghouse Cloud Contact Center Platform 7.2.5 has functionality for loading external XML files and parsing them, allowing an attacker to upload a malicious XML file and reference it in the URL of the application, forcing the application to load and parse the malicious XML file, aka an XXE issue. El archivo ClientServiceConfigController.cs en Enghouse Cloud Contact Center Platform versión 7.2.5, tiene una funcionalidad para cargar archivos XML externos y analizarlos, lo que permite a un atacante cargar un archivo XML malicioso y hacer referencia a él en la URL de la aplicación, forzando a la aplicación a cargar y analizar el Archivo XML malicioso, tambié se conoce como un problema XXE. Enghouse Interactive's CCSP version 7.2.5 suffers from API related XML external entity injection server-side request forgery vulnerabilities. • https://seclists.org/fulldisclosure/2019/May/9 • CWE-611: Improper Restriction of XML External Entity Reference •