Lucene search

K
zdiSina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)ZDI-24-518
HistoryMay 29, 2024 - 12:00 a.m.

Progress Software Telerik Reporting ValidateMetadaUri XML External Entity Processing Information Disclosure Vulnerability

2024-05-2900:00:00
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
www.zerodayinitiative.com
3
progress software
telerik reporting
validatemetadauri
xml
external entity processing
information disclosure
vulnerability
remote attackers
authentication bypass
flaw
xxe
crafted document
xml parser
uri
system context

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Progress Software Telerik Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of ValidateMetadaUri method. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM.

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Related for ZDI-24-518