CVE-2023-27527

7.5 HIGH
XXE

📋 TL;DR

Shinseiyo Sogo Soft versions 7.9A and earlier contain an XML External Entity (XXE) vulnerability that allows attackers to read arbitrary files on the system by processing specially crafted XML files. This affects all users of the vulnerable software versions. The vulnerability stems from improper restriction of XML external entity references during XML parsing.

💻 Affected Systems

Products:
  • Shinseiyo Sogo Soft
Versions: 7.9A and earlier
Operating Systems: Windows (primary platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the XML parsing functionality when processing files from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through sensitive file disclosure (passwords, configuration files, system files) leading to data theft, privilege escalation, or lateral movement.

🟠

Likely Case

Unauthorized access to sensitive files containing business data, credentials, or system information that could be used for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and XML parsing restrictions in place.

🌐 Internet-Facing: MEDIUM - Risk depends on whether the application processes XML from untrusted sources via web interfaces or file uploads.
🏢 Internal Only: MEDIUM - Internal users with access to upload or process XML files could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to submit or trigger processing of malicious XML files through the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 7.9B or later

Vendor Advisory: https://www.touki-kyoutaku-online.moj.go.jp/

Restart Required: Yes

Instructions:

1. Download the latest version from the official vendor site. 2. Backup current installation and data. 3. Install the updated version. 4. Restart the application and verify functionality.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure the XML parser to disable external entity processing if the application allows configuration.

Input validation and filtering

all

Implement strict validation of XML input, reject files with DOCTYPE declarations or external entity references.

🧯 If You Can't Patch

  • Restrict file upload capabilities to trusted sources only
  • Implement network segmentation to limit access to vulnerable systems
  • Apply strict file system permissions to sensitive directories
  • Monitor for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About or similar menu. If version is 7.9A or earlier, the system is vulnerable.

Check Version:

Check application interface or installation directory for version information.

Verify Fix Applied:

Verify version is 7.9B or later after update. Test XML processing with safe test files containing entity declarations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML file processing errors
  • Multiple failed XML parsing attempts
  • Access to system files from application process

Network Indicators:

  • Unusual outbound connections from application to internal systems
  • Large XML file uploads

SIEM Query:

source="application_logs" AND ("XML parse error" OR "DOCTYPE" OR "ENTITY")

🔗 References

📤 Share & Export