CVE-2019-1010268

9.8 CRITICAL
XXE

📋 TL;DR

This vulnerability in Ladon's SOAP interface allows attackers to perform XML External Entity (XXE) attacks by sending specially crafted SOAP requests. Successful exploitation enables reading arbitrary files from the server and accessing internal network endpoints. All Ladon installations using affected versions with SOAP interfaces exposed are vulnerable.

💻 Affected Systems

Products:
  • Ladon
Versions: 0.6.1 and later (since commit ebef0aae48af78c159b6fce81bc6f5e7e0ddb059)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with SOAP interfaces enabled and exposed. The vulnerability is in the SOAP request handler component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise including reading sensitive files (passwords, configs), accessing internal network services, and potential remote code execution through file inclusion.

🟠

Likely Case

Information disclosure of server files including configuration files, source code, and potentially sensitive data stored on the filesystem.

🟢

If Mitigated

Limited impact with proper network segmentation and file system permissions, though information disclosure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID: 43113). Attack requires sending a specially crafted SOAP request to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Ladon repository for latest version with XXE fixes

Vendor Advisory: https://bitbucket.org/jakobsg/ladon

Restart Required: Yes

Instructions:

1. Update Ladon to latest version. 2. Verify XXE protection is enabled in SOAP parser configuration. 3. Restart the Ladon service.

🔧 Temporary Workarounds

Disable external entity processing

all

Configure XML parser to disable external entity resolution

Configure XML parser with: resolve_entities=False, no_network=True

Disable SOAP interface

all

Remove or disable SOAP endpoints if not required

Comment out or remove SOAP interface configuration in Ladon settings

🧯 If You Can't Patch

  • Implement WAF rules to block XXE patterns in SOAP requests
  • Network segmentation to isolate Ladon instances from sensitive internal resources

🔍 How to Verify

Check if Vulnerable:

Test by sending a crafted SOAP request with external entity reference to Ladon SOAP endpoints

Check Version:

Check Ladon version in Python: import ladon; print(ladon.__version__)

Verify Fix Applied:

Attempt XXE attack after patch/configuration changes - should return error or empty response instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP requests with XML entity declarations
  • File read attempts in application logs
  • Errors related to XML parsing failures

Network Indicators:

  • SOAP requests containing DOCTYPE declarations or external entity references
  • Outbound connections from Ladon server to internal resources

SIEM Query:

source="ladon.log" AND ("DOCTYPE" OR "ENTITY" OR "SYSTEM")

🔗 References

📤 Share & Export