// For flags

CVE-2011-3600

 

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-611: Improper Restriction of XML External Entity Reference
CAPEC (-)
Risk
CVSS Score
7.5 High
SSVC
-
KEV
-
EPSS
5.3%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (1)
>= 16.11.01 <= 16.11.04
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (5)
General (4)
apache, redhat, debian
Exploits & POcs (-)
Patches (1)
redhat
Advisories (-)
Summary
Descriptions

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

El endpoint /webtools/control/xmlrpc en el controlador de eventos OFBiz XML-RPC, está expuesto a External Entity Injection al pasar sentencias DOCTYPE con cargas útiles ejecutables que revelan el contenido de los archivos en el sistema de archivos. Además, también puede ser usado para buscar puertos de red abiertos y averiguar a partir de los mensajes de error devueltos si existe un archivo o no. Esto afecta a OFBiz versiones 16.11.01 hasta 16.11.04.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-09-21 CVE Reserved
  • 2019-11-26 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
>= 16.11.01 <= 16.11.04
Search vendor "Apache" for product "Ofbiz" and version " >= 16.11.01 <= 16.11.04"
-
Affected