Description
In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-6358 | In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration. |
References
| Link | Providers |
|---|---|
| https://www.hooperlabs.xyz/disclosures/webfocus.php |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:39:36.191Z
Reserved: 2020-06-16T00:00:00.000Z
Link: CVE-2020-14204
No data.
Status : Modified
Published: 2020-06-22T13:15:12.380
Modified: 2024-11-21T05:02:51.803
Link: CVE-2020-14204
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD