CVE-2022-33739

7.5 HIGH
XXE

📋 TL;DR

CVE-2022-33739 is an XML External Entity (XXE) vulnerability in CA Clarity PPM that allows remote attackers to read arbitrary files on the server. This affects CA Clarity PPM versions 15.8 and below, and version 15.9.0. Attackers can potentially access sensitive system files through insecure XML parsing.

💻 Affected Systems

Products:
  • CA Clarity PPM
Versions: 15.8 and below, 15.9.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the XML parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive files like /etc/passwd, configuration files with credentials, or SSH keys, leading to lateral movement or full system takeover.

🟠

Likely Case

Unauthorized access to sensitive configuration files, application data, or system files containing credentials or business information.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and XML parser hardening.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood and easily exploitable with standard XXE payloads. No public exploit code is known, but the vulnerability type is trivial to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.9.1 and later

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20645

Restart Required: Yes

Instructions:

1. Download CA Clarity PPM 15.9.1 or later from Broadcom support portal. 2. Apply the patch following Broadcom's installation instructions. 3. Restart the CA Clarity PPM application server.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure the XML parser to disable external entity resolution

Set XML parser properties: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true

Input validation and filtering

all

Implement XML input validation to reject malicious XXE payloads

Implement XML schema validation or whitelist allowed XML elements

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to CA Clarity PPM servers
  • Deploy a web application firewall (WAF) with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check CA Clarity PPM version via admin console or version file. If version is 15.8 or below, or exactly 15.9.0, the system is vulnerable.

Check Version:

Check version in Admin Console or examine version.properties file in installation directory

Verify Fix Applied:

Verify version is 15.9.1 or later. Test XML parsing functionality with safe XXE test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts via XML parsing
  • Large XML payloads with external entity references

Network Indicators:

  • HTTP requests with XML content containing SYSTEM or PUBLIC DTD declarations
  • Outbound connections to external URLs from XML parsing

SIEM Query:

source="ca_clarity_logs" AND (message="*XXE*" OR message="*external entity*" OR message="*DOCTYPE*")

🔗 References

📤 Share & Export