CVE-2023-22274

7.5 HIGH
XXE

📋 TL;DR

An unauthenticated attacker can exploit this XXE vulnerability in Adobe RoboHelp Server to read sensitive files from the server filesystem. This affects all RoboHelp Server versions 11.4 and earlier without requiring any user interaction.

💻 Affected Systems

Products:
  • Adobe RoboHelp Server
Versions: 11.4 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server filesystem disclosure including configuration files, credentials, and sensitive data

🟠

Likely Case

Partial information disclosure of accessible files, potentially revealing system information or configuration details

🟢

If Mitigated

No impact if proper XML parsing restrictions are implemented or server is patched

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities typically have low exploitation complexity and this requires no authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.5 or later

Vendor Advisory: https://helpx.adobe.com/security/products/robohelp-server/apsb23-53.html

Restart Required: Yes

Instructions:

1. Download RoboHelp Server 11.5 or later from Adobe. 2. Install the update following Adobe's installation guide. 3. Restart the RoboHelp Server service.

🔧 Temporary Workarounds

Disable external entity processing

all

Configure XML parser to disable external entity resolution

Configure XML parser settings: set javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING to true
Disable DTD processing in XML parsers

Network segmentation

all

Restrict access to RoboHelp Server to trusted networks only

Configure firewall rules to limit inbound connections

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy web application firewall with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check RoboHelp Server version in administration interface or installation directory

Check Version:

Check version.txt in installation directory or via admin interface

Verify Fix Applied:

Verify version is 11.5 or later and test XXE payloads are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Multiple failed XML parsing attempts
  • Requests with XML content containing external entity references

Network Indicators:

  • HTTP requests with XML payloads containing SYSTEM or PUBLIC DTD declarations
  • Outbound connections to unusual domains from server process

SIEM Query:

source="robohelp.log" AND ("XML parsing error" OR "DOCTYPE" OR "SYSTEM")

🔗 References

📤 Share & Export