CVE-2018-1000829
📋 TL;DR
This CVE describes an XML External Entity (XXE) vulnerability in Anyplace software versions before commit 80359b4. Attackers can exploit this via man-in-the-middle attacks on map API calls to read sensitive files, cause denial of service, perform SSRF attacks, or scan internal network ports. Any organization using vulnerable Anyplace versions is affected.
💻 Affected Systems
- Anyplace
📦 What is this software?
Anyplace by Anyplace Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through SSRF leading to internal network access, sensitive data exfiltration, and persistent backdoor installation.
Likely Case
Disclosure of server-side files (including configuration files with credentials), denial of service through resource exhaustion, and internal port scanning.
If Mitigated
Limited impact with proper network segmentation, XML parsing restrictions, and input validation in place.
🎯 Exploit Status
Exploitation requires man-in-the-middle position but no authentication. Public proof-of-concept exists in the referenced 0dd.zone article.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Commit 80359b4 and later
Vendor Advisory: https://github.com/dmsl/anyplace/issues/263
Restart Required: Yes
Instructions:
1. Update Anyplace to commit 80359b4 or later. 2. Restart the Anyplace service. 3. Verify the fix by checking the commit hash.
🔧 Temporary Workarounds
Disable External Entity Processing
allConfigure XML parser to disable external entity processing
Set XML parser properties: FEATURE_SECURE_PROCESSING=true, disallow-doctype-decl=true
Network Segmentation
allIsolate Anyplace servers from sensitive internal networks
🧯 If You Can't Patch
- Implement strict network controls to prevent man-in-the-middle attacks on map API traffic
- Deploy WAF with XXE protection rules and monitor for XML parsing anomalies
🔍 How to Verify
Check if Vulnerable:
Check if Anyplace version is before commit 80359b4 by examining the git commit history or version metadata
Check Version:
git log --oneline -1
Verify Fix Applied:
Confirm the installation is at commit 80359b4 or later using git log or version check
📡 Detection & Monitoring
Log Indicators:
- Unusual XML parsing errors
- Large XML payloads in map API requests
- External entity references in XML
Network Indicators:
- XML payloads with DOCTYPE declarations
- HTTP requests to map API endpoints with unusual XML content
SIEM Query:
source="anyplace.log" AND ("DOCTYPE" OR "ENTITY" OR "SYSTEM")