Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49110: CWE-611 Improper Restriction of XML External Entity Reference in Kiuwan SAST

0
High
VulnerabilityCVE-2023-49110cvecve-2023-49110cwe-611
Published: Thu Jun 20 2024 (06/20/2024, 12:29:34 UTC)
Source: CVE Database V5
Vendor/Project: Kiuwan
Product: SAST

Description

When the Kiuwan Local Analyzer uploads the scan results to the Kiuwan SAST web application (either on-premises or cloud/SaaS solution), the transmitted data consists of a ZIP archive containing several files, some of them in the XML file format. During Kiuwan's server-side processing of these XML files, it resolves external XML entities, resulting in a XML external entity injection attack. An attacker with privileges to scan source code within the "Code Security" module is able to extract any files of the operating system with the rights of the application server user and is potentially able to gain sensitive files, such as configuration and passwords. Furthermore, this vulnerability also allows an attacker to initiate connections to internal systems, e.g. for port scans or accessing other internal functions / applications such as the Wildfly admin console of Kiuwan. This issue affects Kiuwan SAST: <master.1808.p685.q13371

AI-Powered Analysis

AILast updated: 11/04/2025, 21:54:33 UTC

Technical Analysis

CVE-2023-49110 is an XML External Entity (XXE) injection vulnerability classified under CWE-611 affecting Kiuwan SAST, a static application security testing tool used for source code analysis. The flaw occurs when the Kiuwan Local Analyzer uploads scan results to the Kiuwan SAST web application, either on-premises or cloud-hosted. These results include a ZIP archive containing multiple files, some in XML format. During server-side processing, the application improperly resolves external XML entities embedded within these XML files. This behavior allows an attacker with legitimate scanning privileges within the "Code Security" module to craft malicious XML payloads that trigger the XXE vulnerability. Exploiting this, the attacker can read arbitrary files on the server with the permissions of the application server user, potentially exposing sensitive information such as configuration files, credentials, or other secrets. Beyond file disclosure, the vulnerability permits the attacker to initiate outbound connections from the server to internal network systems, enabling activities like port scanning or accessing internal administrative interfaces such as the Wildfly admin console used by Kiuwan. The vulnerability affects versions prior to master.1808.p685.q13371 and has a CVSS v3.1 score of 7.2, indicating high severity. Exploitation requires network access and authenticated scanning privileges but no additional user interaction. Although no known exploits are publicly reported, the vulnerability poses a significant risk due to the potential for data exfiltration and internal network reconnaissance, which could facilitate further attacks or lateral movement within an organization’s environment.

Potential Impact

For European organizations, this vulnerability poses a critical risk to the confidentiality and integrity of sensitive development and operational data. Organizations relying on Kiuwan SAST for code security analysis may have their internal server files exposed, including credentials and configuration files, which could lead to unauthorized access or privilege escalation. The ability to perform internal network scans and access internal services increases the risk of lateral movement and broader network compromise. This is particularly concerning for organizations in regulated sectors such as finance, healthcare, and critical infrastructure, where data breaches can lead to severe legal and financial consequences under GDPR and other regulations. Additionally, the exposure of internal administrative consoles like Wildfly could allow attackers to manipulate or disrupt application services, impacting availability. The requirement for authenticated access limits the attack surface but insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Overall, the impact includes potential data breaches, operational disruption, and increased risk of further exploitation within the internal network.

Mitigation Recommendations

To mitigate CVE-2023-49110, European organizations should: 1) Immediately upgrade Kiuwan SAST to the fixed version master.1808.p685.q13371 or later once available. 2) If patching is not immediately possible, restrict access to the Kiuwan SAST web application and scanning modules to trusted users only, enforcing strict authentication and authorization controls. 3) Implement network segmentation to limit the Kiuwan server’s ability to initiate outbound connections to internal systems, reducing the risk of internal reconnaissance. 4) Monitor and audit scan result uploads and server logs for suspicious XML payloads or unusual file access patterns. 5) Disable or restrict XML external entity processing in the application configuration if possible, or apply XML parsing libraries that are hardened against XXE attacks. 6) Conduct regular reviews of user privileges to ensure only necessary personnel have scanning rights. 7) Employ web application firewalls (WAFs) with rules to detect and block malicious XML payloads targeting XXE vulnerabilities. 8) Educate developers and security teams about the risks of XXE and secure XML handling practices to prevent similar issues in custom integrations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2023-11-22T11:08:37.654Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5cff58c9332ff08e87

Added to database: 11/4/2025, 5:43:56 PM

Last enriched: 11/4/2025, 9:54:33 PM

Last updated: 11/5/2025, 3:10:01 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats