Home

Description

Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.

PUBLISHED Reserved 2024-06-29 | Published 2026-04-30 | Updated 2026-04-30 | Assigner SCHUTZWERK




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y

Problem types

CWE-611 Improper Restriction of XML External Entity Reference

Product status

Default status
unaffected

* (custom)
affected

v20 R4 (custom)
unknown

v20 R7 (custom)
unaffected

Timeline

2024-06-17:Vulnerability discovered
2024-06-24:Attempt to contact vendor, no response received
2024-06-25:CVE ID requested
2024-06-29:CVE-2024-39847 assigned
2024-07-04:Attempt to contact vendor again, no response received
2024-07-09:Attempt to contact vendor again, no response received
2024-07-16:Attempt to contact vendor again, no response received
2024-07-22:Attempt to contact vendor again, no response received
2026-04-29:Advisory published

Credits

Marcelo Reyes of SCHUTZWERK GmbH finder

References

www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/

4d.com product

cve.org (CVE-2024-39847)

nvd.nist.gov (CVE-2024-39847)

Download JSON