Local File Read in CandidATS 3.0.0 via XXE
6,5
Medium
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Local File Read in CandidATS 3.0.0 via XXE
Code name
State
Public
Release date
27 oct 2022
Affected product
CandidATS
Affected version(s)
Version 3.0.0
Vulnerability name
XML injection (XXE)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v3.1 base score
6.5
Exploit available
Yes
CVE ID(s)
Description
CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE.
Vulnerability
The XXE present in CandidATS 3.0.0, allows an unauthenticated remote attacker to read arbitrary files from the server. To trigger this vulnerability, we will need to upload a malicious DOCX to the server.
Exploitation
In this attack we will be able to read arbitrary files from the server, through an XXE.


Our security policy
We have reserved the CVE-2022-42745 to refer to these issues from now on. Disclosure policy
System Information
Version: CandidATS 3.0.0
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://candidats.net/
Timeline
IA generativa
11 oct 2022
Vendor contacted
11 oct 2022
Vendor replied
11 oct 2022
Public disclosure
27 oct 2022