Summary

Acunetix 360 detected that the target application is vulnerable to an Out of Band SAML Consumer Service XML Entity Injection.

The web application uses SAML. The web application's SAML Consumer Service XML parser is vulnerable to XXE. XML supports a facility known as "external entities"(XXE), which instructs an XML processor to retrieve and perform an inline include of XML located at a particular URI. An external XML entity can be used to append or modify an XML document. An unauthenticated attacker may be able to use it in order to read arbitrary files on the server or send requests to other servers (SSRF).

Impact

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier. Since the attack occurs relative to the application processing the XML document, an attacker may use this trusted application to pivot to other internal systems, possibly disclosing other internal content via HTTP (s) requests.

Remediation

Disable parsing of XML external entities.

Severity

High

Classification

PCI v3.2-6.5.1 CAPEC-376 CWE-611 HIPAA-164.306(a) 164.308(a) ISO27001-a.14.2.5 WASC-43 OWASP 2013-A1 OWASP 2017-A4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H