Home

Description

An XML External Entity (XXE) injection vulnerability exists in ETQ Reliance on the CG (legacy) platform within the `/resources/sessions/sso` endpoint. The SAML authentication handler processes XML input without disabling external entity resolution, allowing crafted SAML responses to invoke external entity references. This could enable attackers to retrieve sensitive files or perform server-side request forgery (SSRF). The issue was addressed by disabling external entity processing for the affected XML parser in versions SE.2025.1 and 2025.1.2.

PUBLISHED Reserved 2025-04-15 | Published 2025-07-22 | Updated 2025-11-04 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-611 Improper Restriction of XML External Entity Reference

Product status

Default status
unaffected

* (custom) before SE.2025.1
affected

* (custom) before 2025.1.2
affected

Credits

Adam Kues and Shubham Shah of Assetnote finder

References

www.etq.com/product-overview/ product

www.etq.com/blog/etq-reliance-security-update/ vendor-advisory patch

slcyber.io/...-code-execution-vulnerability-in-etq-reliance/ technical-description

www.vulncheck.com/...-xxe-injection-in-sso-saml-handler-copy third-party-advisory

cve.org (CVE-2025-34142)

nvd.nist.gov (CVE-2025-34142)

Download JSON