Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mbadanoiu/cve-2019-14678
CVE-2019-14678: XML External Entity in SAS XML Mapper
https://github.com/mbadanoiu/cve-2019-14678
0-day cve cve-2019-14678 cves xxe
Last synced: 2 days ago
JSON representation
CVE-2019-14678: XML External Entity in SAS XML Mapper
- Host: GitHub
- URL: https://github.com/mbadanoiu/cve-2019-14678
- Owner: mbadanoiu
- Created: 2024-03-12T15:49:09.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-03-12T16:02:25.000Z (8 months ago)
- Last Synced: 2024-03-12T18:29:15.864Z (8 months ago)
- Topics: 0-day, cve, cve-2019-14678, cves, xxe
- Homepage:
- Size: 1.58 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2019-14678: XML External Entity in SAS XML Mapper
SAS XML Mapper 9.45 has an XML External Entity (XXE) vulnerability that can be leveraged by malicious attackers in multiple ways. Examples are Local File Reading, Out Of Band File Exfiltration, Server Side Request Forgery, and/or Potential Denial of Service attacks. This vulnerability also affects the XMLV2 LIBNAME engine when the AUTOMAP option is used.
### Vendor Disclosure:
The vendor's disclosure and fix for this vulnerability can be found [here](https://support.sas.com/kb/64/719.html).
### Proof Of Concept:
More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2019-14678/blob/main/SAS%20XML%20Mapper%20-%20CVE-2019-14678.pdf).
### Additional Resources:
[XXE OoB Attack](https://www.acunetix.com/blog/articles/band-xml-external-entity-oob-xxe/)
[XML LOL Bomb Attack](https://en.wikipedia.org/wiki/Billion_laughs_attack)