CVE-2024-13971 PUBLISHED

Arbitrary File Read and Server Side Request Forgery via XML External Entities in Lobster_pro

Assigner: SCHUTZWERK
Reserved: 03.07.2025 Published: 30.04.2026 Updated: 30.04.2026

Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/S:N/AU:Y/V:C
CVSS Score: 7.7

Product Status

Vendor Lobster GmbH
Product Lobster_pro
Versions Default: unknown
  • affected from 0 to 4.12.6-GA (excl.)
  • Version 4.12.6-GA is unaffected

Solutions

Update to Lobster_pro release 4.12.6-GA or higher.

Credits

  • Marcelo Reyes of SCHUTZWERK GmbH finder

References

Problem Types

  • CWE-611 Improper Restriction of XML External Entity Reference CWE

Impacts

  • CAPEC-497 File Discovery
  • CAPEC-664 Server Side Request Forgery