Authors:Korprit Zombie Risk：High CVE：CVE-2017-6323 0day:XXE 0day-id:0DAY-6323 Date：2018-04-17
The Symantec Management Console prior to ITMS 8.1 RU1, ITMS 8.0_POST_HF6, and ITMS 7.6_POST_HF7 has an issue whereby XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
XML external entity (XXE) attacks may allow disclosure of local files, which may contain sensitive data such as passwords or private user data. The attack uses file URI schemes or relative paths in the system identifier to access files that should not normally be accessible. Since the attack occurs relative to the application processing the XML document, an attacker may use this trusted application to pivot to other internal systems, possibly disclosing other internal content via HTTP(S) requests or launching a CSRF attack to any unprotected internal services.
This issue was validated by the product team engineers. A Symantec Management Console set of updates, version ITMS 8.1 RU1 as well as patches ITMS 8.0_POST_HF6 & ITMS 7.6_POST_HF7, have been released which address the aforementioned vulnerabilities. Note that the Symantec Management Console’s latest release and patches are available to customers through normal support channels. At this time, Symantec is not aware of any exploitations or adverse customer impact from these issues.
Symantec recommends the following measures to reduce risk of attack:
- Restrict access to administrative or management systems to authorized privileged users.
- Restrict remote access to trusted/authorized systems only.
- Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
- Keep all operating systems and applications current with vendor patches.
- Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection to both inbound and outbound threats.
- Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.
- Korprit Zombie: firstname.lastname@example.org (CVE-2017-6322, CVE-2017-6323)