CBRN-Analysis – External XML entity injection
Update to CBRN-Analysis v.22 or newer.
The CBRN-Analysis is an off-the-shelf CBRN Defence Knowledge Management Software Application that provides Knowledge Management, Hazard Prediction, and Warning and Reporting (W&R) capability, supporting the planning and execution of operations.
The application makes use of an XML parser to process XML files. This xml parser is vulnerable to external XML entity injection or “XXE” attack.
As an example impact, a potential adversary can prepare a malicious “mws”. When this file is opened in the CBRN-Analysis by the victim user, the software will make a network request to a remote resource. That way, the adversary could receive an NTLMv2-SSP hash.
Dawid Czarnecki and Jerome Nokin from NATO Cyber Security Centre
Do you think the security of your data might be lacking? Let's find the best approach together.
Once you contact us, we will ask you about the project you want to secure.