CVE-2018-1000829

9.0 CRITICAL

📋 TL;DR

This CVE describes an XML External Entity (XXE) vulnerability in Anyplace software versions before commit 80359b4. Attackers can exploit this via man-in-the-middle attacks on map API calls to read sensitive files, cause denial of service, perform SSRF attacks, or scan internal network ports. Any organization using vulnerable Anyplace versions is affected.

💻 Affected Systems

Products:
  • Anyplace
Versions: All versions before commit 80359b4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in map API calls and requires man-in-the-middle positioning to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through SSRF leading to internal network access, sensitive data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Disclosure of server-side files (including configuration files with credentials), denial of service through resource exhaustion, and internal port scanning.

🟢

If Mitigated

Limited impact with proper network segmentation, XML parsing restrictions, and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires man-in-the-middle position but no authentication. Public proof-of-concept exists in the referenced 0dd.zone article.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 80359b4 and later

Vendor Advisory: https://github.com/dmsl/anyplace/issues/263

Restart Required: Yes

Instructions:

1. Update Anyplace to commit 80359b4 or later. 2. Restart the Anyplace service. 3. Verify the fix by checking the commit hash.

🔧 Temporary Workarounds

Disable External Entity Processing

all

Configure XML parser to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, disallow-doctype-decl=true

Network Segmentation

all

Isolate Anyplace servers from sensitive internal networks

🧯 If You Can't Patch

  • Implement strict network controls to prevent man-in-the-middle attacks on map API traffic
  • Deploy WAF with XXE protection rules and monitor for XML parsing anomalies

🔍 How to Verify

Check if Vulnerable:

Check if Anyplace version is before commit 80359b4 by examining the git commit history or version metadata

Check Version:

git log --oneline -1

Verify Fix Applied:

Confirm the installation is at commit 80359b4 or later using git log or version check

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Large XML payloads in map API requests
  • External entity references in XML

Network Indicators:

  • XML payloads with DOCTYPE declarations
  • HTTP requests to map API endpoints with unusual XML content

SIEM Query:

source="anyplace.log" AND ("DOCTYPE" OR "ENTITY" OR "SYSTEM")

🔗 References

📤 Share & Export