CVE-2024-4184
📋 TL;DR
This vulnerability allows attackers to perform XML External Entity (XXE) attacks through DTD injection in OpenText Application Automation Tools. Attackers could read arbitrary files from the server, conduct server-side request forgery, or potentially execute remote code. All users running affected versions of OpenText Application Automation Tools are impacted.
💻 Affected Systems
- OpenText Application Automation Tools
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through remote code execution, data exfiltration of sensitive files, and lateral movement within the network.
Likely Case
Arbitrary file read from the server, disclosure of sensitive configuration files, and potential server-side request forgery attacks.
If Mitigated
Limited impact with proper XML parsing configuration and network segmentation preventing external entity resolution.
🎯 Exploit Status
XXE vulnerabilities are well-understood with many public exploitation techniques available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 24.1.1 or later
Vendor Advisory: https://portal.microfocus.com/s/article/KM000033540?language=en_US
Restart Required: Yes
Instructions:
1. Download the latest version from OpenText support portal. 2. Backup current installation. 3. Install the update following vendor documentation. 4. Restart the application services.
🔧 Temporary Workarounds
Disable DTD Processing
allConfigure XML parsers to disable DTD processing and external entity resolution
Set XML parser properties: setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
setFeature("http://xml.org/sax/features/external-general-entities", false);
setFeature("http://xml.org/sax/features/external-parameter-entities", false);
Input Validation
allImplement strict input validation to reject XML containing DOCTYPE declarations
Implement XML schema validation before processing
Use whitelisting for allowed XML structures
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems from sensitive data stores
- Deploy web application firewall with XXE protection rules
🔍 How to Verify
Check if Vulnerable:
Check the installed version of OpenText Application Automation Tools against affected versions (24.1.0 and below)
Check Version:
Check application version through admin console or installation directory version files
Verify Fix Applied:
Verify installation of version 24.1.1 or later and test XML processing with malicious DTD payloads
📡 Detection & Monitoring
Log Indicators:
- XML parsing errors containing DOCTYPE declarations
- Unusual file access patterns from application process
- Outbound connections to unexpected external URLs
Network Indicators:
- HTTP requests containing XML with external entity references
- Unusual outbound traffic from application servers
SIEM Query:
source="application_logs" AND ("DOCTYPE" OR "SYSTEM" OR "ENTITY") AND NOT "expected_xml_pattern"