First published: Wed Sep 25 2019(Updated: )
HCL AppScan Source before 9.03.13 is susceptible to XML External Entity (XXE) attacks in multiple locations. In particular, an attacker can send a specially crafted .ozasmt file to a targeted victim and ask the victim to open it. When the victim imports the .ozasmt file in AppScan Source, the content of any file in the local file system (to which the victim as read access) can be exfiltrated to a remote listener under the attacker's control. The product does not disable external XML Entity Processing, which can lead to information disclosure and denial of services attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HCL AppScan Source | <9.03.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16188 is a vulnerability in HCL AppScan Source before version 9.03.13 that allows for XML External Entity (XXE) attacks.
CVE-2019-16188 allows an attacker to send a specially crafted .ozasmt file to a victim and exploit XML External Entity (XXE) vulnerabilities in multiple locations of HCL AppScan Source before version 9.03.13.
CVE-2019-16188 has a severity rating of 7.1 (high).
To fix CVE-2019-16188, it is recommended to update HCL AppScan Source to version 9.03.13 or later.
For more information about CVE-2019-16188, you can refer to the HCL AppScan Source knowledge base article at the following link: [link](https://hclpnpsupport.hcltech.com/csm?id=kb_article&sys_id=0812a9961b0c885077761fc58d4bcb06)