Description
Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
Problem types
CWE-611 Improper Restriction of XML External Entity Reference
Product status
* (custom)
v20 R4 (custom)
v20 R7 (custom)
Timeline
| 2024-06-17: | Vulnerability discovered |
| 2024-06-24: | Attempt to contact vendor, no response received |
| 2024-06-25: | CVE ID requested |
| 2024-06-29: | CVE-2024-39847 assigned |
| 2024-07-04: | Attempt to contact vendor again, no response received |
| 2024-07-09: | Attempt to contact vendor again, no response received |
| 2024-07-16: | Attempt to contact vendor again, no response received |
| 2024-07-22: | Attempt to contact vendor again, no response received |
| 2026-04-29: | Advisory published |
Credits
Marcelo Reyes of SCHUTZWERK GmbH
References
www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/
4d.com