XXE in IBM Security Directory Server 6.4.0 (Fixed in 6.4.1)
CVE-2022-32755 Published on October 14, 2023

IBM Security Directory Server external entity injection
IBM Security Directory Server 6.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 228505.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2022-32755 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
HIGH

Weakness Type

What is an aka Blind XPath Injection Vulnerability?

The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system. Within XML, special elements could include reserved words or characters such as "<", ">", """, and "&", which could then be used to add new data or modify XML syntax.

CVE-2022-32755 has been classified to as an aka Blind XPath Injection vulnerability or weakness.


Products Associated with CVE-2022-32755

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-32755 are published in these products:

 
 
 

Affected Versions

IBM Security Directory Server Version 6.4.0 is affected by CVE-2022-32755

Exploit Probability

EPSS
0.04%
Percentile
13.23%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.