Zenoss 2.5.3 XML-RPC Subsystem XXE information disclosure – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 23rd, 2019 📆 | 7407 Views ⚑


Zenoss 2.5.3 XML-RPC Subsystem XXE information disclosure

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in Zenoss 2.5.3. It has been rated as problematic. This issue affects an unknown code of the component XML-RPC Subsystem. The manipulation with an unknown input leads to a information disclosure vulnerability (XXE). Using CWE to declare the problem leads to CWE-611. Impacted is confidentiality.

The weakness was presented 08/21/2019. It is possible to read the advisory at coalfire.com. The identification of this vulnerability is CVE-2019-14258 since 07/24/2019. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.

Addressing this vulnerability is possible by firewalling 9988.

See 140542 for similar entry.


VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.2

VulDB Base Score: ≈4.3
VulDB Temp Score: ≈4.2
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure / XXE (CWE-611)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Firewall
Status: 🔍

0-Day Time: 🔒

Firewalling: 🔒

07/24/2019 CVE assigned
08/21/2019 +28 days Advisory disclosed
08/22/2019 +1 days VulDB entry created
08/22/2019 +0 days VulDB last updateAdvisory: coalfire.com

CVE: CVE-2019-14258 (🔒)
See also: 🔒

Created: 08/22/2019 09:27 AM
Complete: 🔍

See the underground prices here!


Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *