CA Identity Manager XML Entity Expansion Vulnerability
search cancel

CA Identity Manager XML Entity Expansion Vulnerability

book

Article ID: 408787

calendar_today

Updated On:

Products

CA Identity Suite

Issue/Introduction

During the security tests, it was shown that the analyzed application is vulnerable to XML Entity Expansion attacks. Initially, the use of a DOCTYPE block is shown to define a "Tarlogic" entity on a request. In the corresponding response, it can be seen that the server correctly processes the entity.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Environment

IDM 14.5.1

Cause

XML Entity Expansion Vulnerability in TEWS

Resolution

It is recommended to generally disable the processing of DOCTYPE blocks, avoiding the arbitrary definition of entities. To do so, the documentation of the XML "parser" being used must be consulted. Useful information on disabling processing for these entities on the most common development platforms can be found in the following OWASP references.

A HF for the Production Server Environment is available.Please raise a support ticket and request for the fix.

Additional Information

Reference DE# DE650358