CVE-2024-39847 PUBLISHED

Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP

Assigner: SCHUTZWERK
Reserved: 29.06.2024 Published: 30.04.2026 Updated: 30.04.2026

Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y
CVSS Score: 8.7

Product Status

Vendor 4D
Product 4D Server
Versions Default: unaffected
  • affected from * to v20 R3 (incl.)
  • unknown from v20 R4 to v20 R6 (incl.)
  • Version v20 R7 is unaffected

Solutions

Update to 4D Server 20 R7 or higher.

Credits

  • Marcelo Reyes of SCHUTZWERK GmbH finder

References

Problem Types

  • CWE-611 Improper Restriction of XML External Entity Reference CWE

Impacts

  • CAPEC-664 Server Side Request Forgery
  • CAPEC-497 File Discovery