CVE-2015-0923
Published Feb 14, 2015
Last updated 10 years ago
Overview
- Description
- The ContentBlockEx method in Workarea/ServerControlWS.asmx in Ektron Content Management System (CMS) 8.5 and 8.7 before 8.7sp2 and 9.0 before sp1 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference within an XML document named in the xslt parameter, related to an XML External Entity (XXE) issue.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/611.html">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ektron:ektron_content_management_system:8.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CE05608-CA88-4EC1-A99B-57CBC3F82E43" }, { "criteria": "cpe:2.3:a:ektron:ektron_content_management_system:8.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "680BB0D0-703E-4858-B96F-E046B5F8007E" }, { "criteria": "cpe:2.3:a:ektron:ektron_content_management_system:8.7.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "798E5E7C-390A-45E1-BD66-F38877A895D5" }, { "criteria": "cpe:2.3:a:ektron:ektron_content_management_system:8.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7229DF65-AD95-45E6-AE9F-283CD955F0F1" } ], "operator": "OR" } ] } ]