Vulnerability Details : CVE-2011-1280
The XML Editor in Microsoft InfoPath 2007 SP2 and 2010; SQL Server 2005 SP3 and SP4 and 2008 SP1, SP2, and R2; SQL Server Management Studio Express (SSMSE) 2005; and Visual Studio 2005 SP1, 2008 SP1, and 2010 does not properly handle external entities, which allows remote attackers to read arbitrary files via a crafted .disco (Web Service Discovery) file, aka "XML External Entities Resolution Vulnerability."
Products affected by CVE-2011-1280
- cpe:2.3:a:microsoft:sql_server:2005:sp3:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp3:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:x32:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp1:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp1:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:express:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:r2:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp3:express:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp3:express_advanced_services:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:*:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:r2:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:express_advanced_services:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio:2008:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio:2005:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio:2010:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_infopath:2007:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_infopath:2010:*:x32:*:*:*:*:*
- cpe:2.3:a:microsoft:office_infopath:2010:*:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server_management_studio_express:2005:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server_management_studio_express:2005:*:x64:*:*:*:*:*
Threat overview for CVE-2011-1280
Top countries where our scanners detected CVE-2011-1280
Top open port discovered on systems with this issue
1433
IPs affected by CVE-2011-1280 883
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-1280!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-1280
33.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1280
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2011-1280
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1280
-
http://secunia.com/advisories/44912
Sign in
-
http://www.securityfocus.com/bid/48196
Microsoft XML External Entities Resolution CVE-2011-1280 Information Disclosure Vulnerability
-
http://www.securitytracker.com/id?1025646
Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12664
Repository / Oval Repository
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-049
Microsoft Security Bulletin MS11-049 - Important | Microsoft Docs
-
http://www.securitytracker.com/id?1025648
Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker
-
http://www.securitytracker.com/id?1025647
Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker
Jump to