Lucene search

K
ptsecurityPositive TechnologiesPT-2018-34
HistorySep 10, 2018 - 12:00 a.m.

PT-2018-34: XXE Injection in S3 Browser

2018-09-1000:00:00
Positive Technologies
www.ptsecurity.com
11

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

64.8%

PT-2018-34: XXE Injection in S3 Browser

Vulnerable software

S3 Browser
Version: 7.x and earlier

Link:
<https://s3browser.com/&gt;

Severity level

Severity level: Medium
Impact: Partial user-file reading, obtaining user NTLMv2 hash
Access Vector: Remote

CVSS v3:
Base Score: 6.9
Vector: (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N)

CVE: CVE-2018-20298

Vulnerability description

The specialists of the Positive Research center have detected an XXE Injection vulnerability in S3 Browser.

A vulnerability in the HTTP-based S3 protocol, due to server responses transmitted in XML format, allows remote attackers to read user files and obtain NTLMv2 hash values by tricking a user into connecting to a malicious server.

How to fix

Update your software up to the latest version

Advisory status

09.10.2018 - Vendor gets vulnerability details
18.12.2018 - Vendor releases fixed version and details
18.12.2018 - Public disclosure

Credits

The vulnerability was detected by Igor Kanygin, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2018-34&gt;

Reports on the vulnerabilities previously discovered by Positive Research:

https://www.ptsecurity.com/
<https://en.securitylab.ru/lab/&gt;

About Positive Technologies

Positive Technologies is a leading digital security firm with over 15 years of experience in 360Β° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the company’s research centerβ€”one of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

64.8%

Related for PT-2018-34