Lucene search

K
cve[email protected]CVE-2020-7032
HistoryNov 13, 2020 - 1:15 a.m.

CVE-2020-7032

2020-11-1301:15:11
CWE-611
web.nvd.nist.gov
44
cve-2020-7032
xxe
avaya
weblm
vulnerability
ssrf
nvd
security
dtd

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

6.3 Medium

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%

An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2.

Affected configurations

NVD
Node
avayaaura_system_managerRange7.07.1.3.6
OR
avayaaura_system_managerRange8.08.1.2
OR
avayaweblmRange7.07.1.3.6
OR
avayaweblmRange8.0.08.1.3

CNA Affected

[
  {
    "product": "WebLM",
    "vendor": "Avaya",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.x"
      },
      {
        "lessThan": "7.1.3.6",
        "status": "affected",
        "version": "7.0",
        "versionType": "custom"
      },
      {
        "lessThan": "8.1.2",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "System Manager",
    "vendor": "Avaya",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.x"
      },
      {
        "lessThan": "7.1.3.6",
        "status": "affected",
        "version": "7.0",
        "versionType": "custom"
      },
      {
        "lessThan": "8.1.2",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      }
    ]
  }
]

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

6.3 Medium

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%

Related for CVE-2020-7032