APP: Arcserve D2D getNews External Entity Injection

This signature detects attempts to exploit a known vulnerability against Arcserve D2D. A successful attack can lead to sensitive information disclosure.

Extended Description

This vulnerability allows remote attackers to disclose sensitive information on affected installations of CA Arcserve D2D 16.5. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getNews method. Due to the improper restriction of XML External Entity (XXE) references, a specially-crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11103.

Affected Products

Arcserve d2d

Short Name
APP:CA:ARCSRV:D2D-GETNEWS-XXE
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Arcserve CVE-2020-27858 D2D Entity External Injection getNews
Release Date
12/17/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3351
False Positive
Unknown
Vendors

Arcserve

CVSS Score

5.0

Found a potential security threat?