CVE-2022-41221

7.1 HIGH

📋 TL;DR

This XXE vulnerability in OpenText Archive Center Administration allows authenticated users to upload malicious XML files that can lead to data exfiltration or denial of service. The vulnerability affects authenticated users of the administration client, requiring access to upload XML files to the application.

💻 Affected Systems

Products:
  • OpenText Archive Center Administration
Versions: Versions 16.2.3, 21.2, and older versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the administration client with upload permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive data from the server, read local files, or cause complete denial of service to the application instance and underlying system.

🟠

Likely Case

Authenticated malicious users could extract configuration files, user data, or cause application instability through XML parsing attacks.

🟢

If Mitigated

With proper XML validation and input sanitization, the attack surface is significantly reduced, though authenticated users could still attempt exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and ability to upload XML files. XXE attacks are well-documented and relatively straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check OpenText security advisories for specific patched versions

Vendor Advisory: https://www.opentext.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Check OpenText security advisories for the specific patch version. 2. Apply the official patch from OpenText. 3. Restart the Archive Center Administration service. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable XML External Entity Processing

all

Configure the XML parser to disable external entity resolution

Configure XML parser settings to set features: FEATURE_SECURE_PROCESSING = true, http://apache.org/xml/features/disallow-doctype-decl = true, http://xml.org/sax/features/external-general-entities = false, http://xml.org/sax/features/external-parameter-entities = false

Restrict XML Upload Permissions

all

Limit which authenticated users can upload XML files to the administration client

Review and modify user permissions in OpenText Archive Center Administration to restrict XML upload capabilities

🧯 If You Can't Patch

  • Implement strict input validation for all XML uploads, rejecting files with DOCTYPE declarations or external entity references
  • Deploy a web application firewall (WAF) with XXE protection rules and monitor for XML upload attempts

🔍 How to Verify

Check if Vulnerable:

Test by uploading a benign XML file with external entity references to see if they are processed. Check application logs for XML parsing errors.

Check Version:

Check the OpenText Archive Center Administration client version in the application interface or configuration files.

Verify Fix Applied:

Attempt to upload a test XML file with external entity references after patching - it should be rejected or processed safely without external resolution.

📡 Detection & Monitoring

Log Indicators:

  • XML parsing errors
  • Failed XML upload attempts
  • Unusual file read operations from XML parser
  • External network connections initiated by XML processing

Network Indicators:

  • Outbound connections to unexpected external systems during XML processing
  • DNS requests for external entities referenced in XML

SIEM Query:

source="opentext-archive-center" AND (event_type="xml_upload" OR message="*DOCTYPE*" OR message="*ENTITY*")

🔗 References

📤 Share & Export