Learn about CVE-2018-12463 affecting Fortify Software Security Center (SSC) versions 17.1, 17.2, and 18.1. Understand the XXE vulnerability enabling SSRF attacks and the mitigation steps.
Fortify Software Security Center (SSC) versions 17.1, 17.2, and 18.1 are affected by an XML external entity (XXE) vulnerability, allowing remote unauthenticated individuals to access arbitrary files or conduct server-side request forgery (SSRF) attacks.
Understanding CVE-2018-12463
This CVE involves a vulnerability in Fortify Software Security Center (SSC) that can be exploited for SSRF attacks.
What is CVE-2018-12463?
The vulnerability in Fortify Software Security Center (SSC) versions 17.1, 17.2, and 18.1, known as XML external entity (XXE), enables remote unauthenticated individuals to access and read arbitrary files or perform SSRF attacks by utilizing a manipulated Document Type Definition (DTD) in an XML request.
The Impact of CVE-2018-12463
The vulnerability has a CVSS v3.0 base score of 7.3, categorizing it as HIGH severity. The attack complexity is LOW, with a NETWORK attack vector. While the confidentiality, integrity, and privileges required impacts are LOW, the availability impact is also LOW.
Technical Details of CVE-2018-12463
Fortify Software Security Center (SSC) is affected by an XXE vulnerability that can lead to SSRF attacks.
Vulnerability Description
The vulnerability allows remote unauthenticated users to read arbitrary files or conduct SSRF attacks through a crafted DTD in an XML request.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by manipulating the Document Type Definition (DTD) in an XML request, enabling unauthorized access to files or SSRF attacks.
Mitigation and Prevention
Steps to address and prevent exploitation of CVE-2018-12463.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates