Out of Band SAML Consumer Service XML Entity Injection

Severity: High

Invicti detected that the target application is vulnerable to an Out of Band SAML Consumer Service XML Entity Injection.

The web application uses SAML. The web application's SAML Consumer Service XML parser is vulnerable to XXE. XML supports a facility known as "external entities"(XXE), which instructs an XML processor to retrieve and perform an inline include of XML located at a particular URI. An external XML entity can be used to append or modify an XML document. An unauthenticated attacker may be able to use it in order to read arbitrary files on the server or send requests to other servers (SSRF).


Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier. Since the attack occurs relative to the application processing the XML document, an attacker may use this trusted application to pivot to other internal systems, possibly disclosing other internal content via HTTP (s) requests.


Disable parsing of XML external entities.


Search Vulnerability

Build your resistance to threats. And save hundreds of hours each month.

Get a demo See how it works