First published: Thu Mar 23 2017(Updated: )
NetIQ Access Manager 4.1 before 4.1.2 HF 1 and 4.2 before 4.2.2 was parsing incoming SAML requests with external entity resolution enabled, which could lead to local file disclosure via an XML External Entity (XXE) attack.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus NetIQ Access Manager | =4.1 | |
Micro Focus NetIQ Access Manager | =4.1-sp1 | |
Micro Focus NetIQ Access Manager | =4.1-sp2 | |
Micro Focus NetIQ Access Manager | =4.2 | |
Micro Focus NetIQ Access Manager | =4.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5749 has been assigned a medium severity rating, indicating potential risks but manageable in most environments.
To fix CVE-2016-5749, upgrade to NetIQ Access Manager version 4.1.2 HF 1 or 4.2.2 and ensure external entity resolution is disabled.
CVE-2016-5749 exposes systems to XML External Entity (XXE) attacks that can result in local file disclosure.
Versions 4.1 before 4.1.2 HF 1 and 4.2 before 4.2.2 of NetIQ Access Manager are affected by CVE-2016-5749.
The primary cause of CVE-2016-5749 is the parsing of incoming SAML requests with external entity resolution enabled.