U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-49110

Change History

New CVE Received by NIST 6/20/2024 9:15:49 AM

Action Type Old Value New Value
Added CWE

								
							
							
						
SEC Consult Vulnerability Lab CWE-611
Added Description

								
							
							
						
When the Kiuwan Local Analyzer uploads the scan results to the Kiuwan SAST web 
application (either on-premises or cloud/SaaS solution), the transmitted data 
consists of a ZIP archive containing several files, some of them in the 
XML file format. During Kiuwan's server-side processing of these XML 
files, it resolves external XML entities, resulting in a XML external 
entity injection attack. An attacker with privileges to scan 
source code within the "Code Security" module is able to extract any 
files of the operating system with the rights of the application server 
user and is potentially able to gain sensitive files, such as 
configuration and passwords. Furthermore, this vulnerability also allows
 an attacker to initiate connections to internal systems, e.g. for port 
scans or accessing other internal functions / applications such as the 
Wildfly admin console of Kiuwan.

This issue affects Kiuwan SAST: <master.1808.p685.q13371
Added Reference

								
							
							
						
SEC Consult Vulnerability Lab https://r.sec-consult.com/kiuwan [No types assigned]
Added Reference

								
							
							
						
SEC Consult Vulnerability Lab https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log [No types assigned]