Vulnerability Description
The XML API in Openbravo ERP 2.5, 3.0, and earlier allows remote authenticated users to read arbitrary files via an XML document with an external entity declaration in conjunction with an entity reference to /ws/dal/ADUser or other /ws/dal/XXX interfaces, related to an XML External Entity (XXE) issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbravo | Openbravo Erp | <= 3.0 |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/533894ExploitUS Government Resource
- http://www.securityfocus.com/bid/63431Exploit
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-a
- http://www.kb.cert.org/vuls/id/533894ExploitUS Government Resource
- http://www.securityfocus.com/bid/63431Exploit
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-a
FAQ
What is CVE-2013-3617?
CVE-2013-3617 is a vulnerability with a CVSS score of 3.5 (LOW). The XML API in Openbravo ERP 2.5, 3.0, and earlier allows remote authenticated users to read arbitrary files via an XML document with an external entity declaration in conjunction with an entity refer...
How severe is CVE-2013-3617?
CVE-2013-3617 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3617?
Check the references section above for vendor advisories and patch information. Affected products include: Openbravo Openbravo Erp.