Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

2 vulnerabilities

CVE-2024-13971 (GCVE-0-2024-13971)

Vulnerability from cvelistv5 – Published: 2026-04-30 12:11 – Updated: 2026-04-30 13:15
VLAI?
Title
Arbitrary File Read and Server Side Request Forgery via XML External Entities in Lobster_pro
Summary
Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Assigner
Impacted products
Vendor Product Version
Lobster GmbH Lobster_pro Affected: 0 , < 4.12.6-GA (custom)
Unaffected: 4.12.6-GA (custom)
Create a notification for this product.
Credits
Marcelo Reyes of SCHUTZWERK GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13971",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-30T13:15:29.784951Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-30T13:15:37.670Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Lobster_pro",
          "vendor": "Lobster GmbH",
          "versions": [
            {
              "lessThan": "4.12.6-GA",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "4.12.6-GA",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:lobster_gmbh:lobster_pro:*:*:windows:*:*:*:*:*",
                  "versionEndExcluding": "4.12.6-ga",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:lobster_gmbh:lobster_pro:4.12.6-ga:*:windows:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marcelo Reyes of SCHUTZWERK GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cspan\u003eUnauthenticated attackers can exploit a weakness in the XML parser functionality of of Lobster_pro prior to version 4.12.6-GA.\u003c/span\u003e\u003cspan\u003e This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\u003c/span\u003e\u003c/div\u003e"
            }
          ],
          "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-497",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-497 File Discovery"
            }
          ]
        },
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "NOT_DEFINED",
            "Safety": "NEGLIGIBLE",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "CONCENTRATED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/S:N/AU:Y/V:C",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-30T12:11:46.544Z",
        "orgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
        "shortName": "SCHUTZWERK"
      },
      "references": [
        {
          "url": "https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-005/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to Lobster_pro release 4.12.6-GA or higher."
            }
          ],
          "value": "Update to Lobster_pro release 4.12.6-GA or higher."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-08-12T11:00:00.000Z",
          "value": "Initial contact with vendor"
        },
        {
          "lang": "en",
          "time": "2024-08-14T11:00:00.000Z",
          "value": "Vulnerability reported to vendor"
        },
        {
          "lang": "en",
          "time": "2024-08-14T11:00:00.000Z",
          "value": "CVE ID requested"
        },
        {
          "lang": "en",
          "time": "2024-08-22T11:00:00.000Z",
          "value": "Initial feedback received from vendor: unable to reproduce"
        },
        {
          "lang": "en",
          "time": "2024-08-28T11:00:00.000Z",
          "value": "Vulnerability demonstrated in vendor\u0027s \"Community server\""
        },
        {
          "lang": "en",
          "time": "2024-09-19T11:00:00.000Z",
          "value": "Vulnerability reported fixed by vendor in Lobster_pro release 4.12.6-GA"
        },
        {
          "lang": "en",
          "time": "2025-07-03T11:00:00.000Z",
          "value": "Reserved CVE ID CVE-2024-13971"
        },
        {
          "lang": "en",
          "time": "2026-04-30T11:00:00.000Z",
          "value": "Advisory released"
        }
      ],
      "title": "Arbitrary File Read and Server Side Request Forgery via XML External Entities in Lobster_pro",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
    "assignerShortName": "SCHUTZWERK",
    "cveId": "CVE-2024-13971",
    "datePublished": "2026-04-30T12:11:46.544Z",
    "dateReserved": "2025-07-03T09:19:50.254Z",
    "dateUpdated": "2026-04-30T13:15:37.670Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-39847 (GCVE-0-2024-39847)

Vulnerability from cvelistv5 – Published: 2026-04-30 07:10 – Updated: 2026-04-30 13:00
VLAI?
Title
Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP
Summary
Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Assigner
Impacted products
Vendor Product Version
4D 4D Server Affected: * , ≤ v20 R3 (custom)
Unknown: v20 R4 , ≤ v20 R6 (custom)
Unaffected: v20 R7 (custom)
Create a notification for this product.
Credits
Marcelo Reyes of SCHUTZWERK GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39847",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-30T13:00:30.372326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-30T13:00:38.371Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "4D Web Server"
          ],
          "platforms": [
            "Windows"
          ],
          "product": "4D Server",
          "vendor": "4D",
          "versions": [
            {
              "lessThanOrEqual": "v20 R3",
              "status": "affected",
              "version": "*",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "v20 R6",
              "status": "unknown",
              "version": "v20 R4",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "v20 R7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:4d:4d_server:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "v20_r3",
                  "versionStartIncluding": "*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:4d:4d_server:v20_r7:*:windows:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marcelo Reyes of SCHUTZWERK GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\u003cbr\u003e"
            }
          ],
          "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        },
        {
          "capecId": "CAPEC-497",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-497 File Discovery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-30T07:10:17.999Z",
        "orgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
        "shortName": "SCHUTZWERK"
      },
      "references": [
        {
          "url": "https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://4d.com"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to 4D Server 20 R7 or higher."
            }
          ],
          "value": "Update to 4D Server 20 R7 or higher."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-06-17T11:00:00.000Z",
          "value": "Vulnerability discovered"
        },
        {
          "lang": "en",
          "time": "2024-06-24T11:00:00.000Z",
          "value": "Attempt to contact vendor, no response received"
        },
        {
          "lang": "en",
          "time": "2024-06-25T11:00:00.000Z",
          "value": "CVE ID requested"
        },
        {
          "lang": "en",
          "time": "2024-06-29T14:59:00.000Z",
          "value": "CVE-2024-39847 assigned"
        },
        {
          "lang": "en",
          "time": "2024-07-04T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-09T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-16T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-22T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2026-04-29T11:00:00.000Z",
          "value": "Advisory published"
        }
      ],
      "title": "Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
    "assignerShortName": "SCHUTZWERK",
    "cveId": "CVE-2024-39847",
    "datePublished": "2026-04-30T07:10:17.999Z",
    "dateReserved": "2024-06-29T20:55:54.740Z",
    "dateUpdated": "2026-04-30T13:00:38.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}