Vulnerability Details : CVE-2017-9231
XML external entity (XXE) vulnerability in Citrix XenMobile Server 9.x and 10.x before 10.5 RP3 allows attackers to obtain sensitive information via unspecified vectors.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2017-9231
- cpe:2.3:o:citrix:xenmobile_server:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.4:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:citrix:xenmobile_server:9.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-9231
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-9231
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-9231
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-9231
-
https://support.citrix.com/article/CTX220138
XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.x and 9.xVendor Advisory
-
http://www.securitytracker.com/id/1038704
Citrix XenMobile Server XML External Entity Processing Flaw Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker
-
http://www.securityfocus.com/bid/98995
Citrix XenMobile Server CVE-2017-9231 XML External Entity Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
Jump to