In BubbleUPnP 0.9 update 30, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running BubbleUPnP, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack the cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
References
Link Resource
https://www.bubblesoftapps.com/bubbleupnpserver2/docs/changelog.html Release Notes Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-19T16:13:41

Updated: 2019-06-19T16:13:41

Reserved: 2018-08-17T00:00:00


Link: CVE-2018-15506

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-06-19T17:15:10.563

Modified: 2019-06-21T16:14:11.437


Link: CVE-2018-15506

JSON object: View

cve-icon Redhat Information

No data.

CWE