Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-14678 PoC — SAS Institute SAS XML Mapper 代码问题漏洞

Source
Associated Vulnerability
Title:SAS Institute SAS XML Mapper 代码问题漏洞 (CVE-2019-14678)
Description:SAS Institute SAS XML Mapper是美国赛仕(SAS Institute)公司的一款XML映射器。该产品能够自动分析XML文件的结构并生成基本元数据。 SAS Institute SAS XML Mapper 9.45版本中存在代码问题漏洞。该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。
Description
CVE-2019-14678: XML External Entity in SAS XML Mapper
Readme
# CVE-2019-14678: XML External Entity in SAS XML Mapper

SAS XML Mapper 9.45 has an XML External Entity (XXE) vulnerability that can be leveraged by malicious attackers in multiple ways. Examples are Local File Reading, Out Of Band File Exfiltration, Server Side Request Forgery, and/or Potential Denial of Service attacks. This vulnerability also affects the XMLV2 LIBNAME engine when the AUTOMAP option is used.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://support.sas.com/kb/64/719.html).

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2019-14678/blob/main/SAS%20XML%20Mapper%20-%20CVE-2019-14678.pdf).

### Additional Resources:

[XXE OoB Attack](https://www.acunetix.com/blog/articles/band-xml-external-entity-oob-xxe/)

[XML LOL Bomb Attack](https://en.wikipedia.org/wiki/Billion_laughs_attack)
File Snapshot

[4.0K] /data/pocs/8b07ab1363584745284687e7af66d51e20a3a2b9 ├── [ 943] README.md └── [1.8M] SAS XML Mapper - CVE-2019-14678.pdf 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.