CVE-2024-45745

5.0 MEDIUM
XXE

📋 TL;DR

This vulnerability allows authenticated attackers in TopQuadrant TopBraid EDG to upload XML DTD files containing malicious JavaScript, enabling them to read local files or access external URLs via XXE (XML External Entity) attacks. It affects all authenticated users of TopBraid EDG versions before 8.0.1. The attack requires authentication but can lead to sensitive data exposure.

💻 Affected Systems

Products:
  • TopQuadrant TopBraid EDG
Versions: All versions before 8.0.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the application. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive local files (configuration files, credentials, database files), access internal URLs, and potentially pivot to other systems using stolen credentials or data.

🟠

Likely Case

Authenticated malicious users or compromised accounts reading configuration files, accessing internal resources, and exfiltrating sensitive data from the server.

🟢

If Mitigated

With proper authentication controls and network segmentation, impact is limited to the application server's file system and accessible network resources.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of XML DTD/XXE techniques. The vulnerability is well-documented in the CWE-611 category.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.1

Vendor Advisory: https://www.topquadrant.com/wp-content/uploads/2024/06/changelog-8.0.1.txt

Restart Required: Yes

Instructions:

1. Download TopBraid EDG version 8.0.1 or later from TopQuadrant. 2. Backup current installation and data. 3. Install the new version following vendor documentation. 4. Restart the application server. 5. Verify functionality.

🔧 Temporary Workarounds

Disable DTD processing

all

Configure XML parsers to disable DTD processing and external entity resolution

Configure application server XML parser settings: set FEATURE_SECURE_PROCESSING=true, disable external-general-entities and external-parameter-entities

Restrict file uploads

all

Implement strict file upload validation to block XML DTD files

Configure file upload filters to reject files with .dtd, .xml extensions or containing DOCTYPE declarations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TopBraid EDG servers from sensitive internal resources
  • Enhance authentication monitoring and implement multi-factor authentication for all users

🔍 How to Verify

Check if Vulnerable:

Check TopBraid EDG version via admin interface or configuration files. Versions before 8.0.1 are vulnerable.

Check Version:

Check application.properties or version.txt files in installation directory, or use admin web interface

Verify Fix Applied:

Verify version is 8.0.1 or later in admin interface. Test XML upload functionality with DTD files to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML file uploads
  • Multiple failed XML parsing attempts
  • Requests containing DOCTYPE or SYSTEM declarations
  • Outbound connections from application server to unexpected URLs

Network Indicators:

  • HTTP requests with XML payloads containing external entity references
  • Outbound connections from application server to file:// or http:// URLs in XML payloads

SIEM Query:

source="topbraid-logs" AND (message="*DOCTYPE*" OR message="*SYSTEM*" OR message="*ENTITY*")

🔗 References

📤 Share & Export