Vulnerability Details : CVE-2018-18406
An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE vulnerability is blind since the response doesn't directly display a requested file, but rather returns it inside the name data field when the report is saved. An attacker is able to view restricted operating system files. This issue affects all types of users: administrators or normal users.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2018-18406
- cpe:2.3:a:tufin:securetrack:18.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18406
1.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18406
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
9.9
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
NIST |
CWE ids for CVE-2018-18406
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18406
-
https://forum.tufin.com/support/kc/latest/
Tufin Knowledge Center R19-1Vendor Advisory
-
https://www.exploit-db.com/exploits/45808
TufinOS 2.17 Build 1193 - XML External Entity InjectionExploit;Third Party Advisory;VDB Entry
-
https://www.tufin.com/
Network Security Policy Management, Firewall Management | TufinVendor Advisory
Jump to