CVE-2015-7326
📋 TL;DR
This XML External Entity (XXE) vulnerability in Milton Webdav allows attackers to read arbitrary files from the server filesystem, potentially leading to sensitive data exposure. It affects all systems running Milton Webdav versions before 2.7.0.3 that process XML input.
💻 Affected Systems
- Milton Webdav
📦 What is this software?
Webdav by Milton
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through file disclosure, potentially including configuration files, credentials, and sensitive application data, which could lead to further attacks.
Likely Case
Unauthorized reading of server files including configuration files, source code, and potentially sensitive data stored on the filesystem.
If Mitigated
Limited impact with proper XML parsing configuration that disables external entity processing.
🎯 Exploit Status
XXE vulnerabilities are well-understood with readily available exploit techniques. The vulnerability allows reading arbitrary files via crafted XML requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.7.0.3
Vendor Advisory: https://github.com/miltonio/milton2/commit/5f81b0c48a817d4337d8b0e99ea0b4744ecd720b
Restart Required: Yes
Instructions:
1. Update Milton Webdav to version 2.7.0.3 or later. 2. Update dependencies in your project configuration. 3. Restart the application server. 4. Verify the fix by checking the version and testing XXE protection.
🔧 Temporary Workarounds
Disable XXE in XML parser
allConfigure XML parser to disable external entity processing
Set XML parser properties: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true
Input validation and filtering
allFilter or reject XML input containing DOCTYPE declarations or external entity references
Implement input validation to block XML with DOCTYPE or SYSTEM entities
🧯 If You Can't Patch
- Implement network segmentation to restrict access to vulnerable systems
- Deploy web application firewall (WAF) with XXE protection rules
🔍 How to Verify
Check if Vulnerable:
Check if Milton Webdav version is below 2.7.0.3 and test with XXE payloads to read server files.
Check Version:
Check application dependencies or pom.xml for Milton Webdav version
Verify Fix Applied:
Test with XXE payloads after patching to confirm file reading is no longer possible.
📡 Detection & Monitoring
Log Indicators:
- XML parsing errors, unusual file access patterns, requests containing DOCTYPE or SYSTEM entities
Network Indicators:
- HTTP requests with XML payloads containing external entity references, unusual outbound connections from server
SIEM Query:
source="web_server" AND (http_request CONTAINS "<!DOCTYPE" OR http_request CONTAINS "SYSTEM")
🔗 References
- http://packetstormsecurity.com/files/134178/Milton-Webdav-2.7.0.1-XXE-Injection.html
- http://www.securityfocus.com/archive/1/536813/100/0/threaded
- http://www.securityfocus.com/bid/77392
- https://github.com/miltonio/milton2/commit/5f81b0c48a817d4337d8b0e99ea0b4744ecd720b
- https://github.com/miltonio/milton2/commit/b41072b
- https://github.com/miltonio/milton2/commit/b5851c1
- http://packetstormsecurity.com/files/134178/Milton-Webdav-2.7.0.1-XXE-Injection.html
- http://www.securityfocus.com/archive/1/536813/100/0/threaded
- http://www.securityfocus.com/bid/77392
- https://github.com/miltonio/milton2/commit/5f81b0c48a817d4337d8b0e99ea0b4744ecd720b
- https://github.com/miltonio/milton2/commit/b41072b
- https://github.com/miltonio/milton2/commit/b5851c1