CVE-2024-39847 (GCVE-0-2024-39847)

Vulnerability from cvelistv5 – Published: 2026-04-30 07:10 – Updated: 2026-04-30 13:00
VLAI?
Title
Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP
Summary
Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Assigner
Impacted products
Vendor Product Version
4D 4D Server Affected: * , ≤ v20 R3 (custom)
Unknown: v20 R4 , ≤ v20 R6 (custom)
Unaffected: v20 R7 (custom)
Create a notification for this product.
Credits
Marcelo Reyes of SCHUTZWERK GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39847",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-30T13:00:30.372326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-30T13:00:38.371Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "4D Web Server"
          ],
          "platforms": [
            "Windows"
          ],
          "product": "4D Server",
          "vendor": "4D",
          "versions": [
            {
              "lessThanOrEqual": "v20 R3",
              "status": "affected",
              "version": "*",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "v20 R6",
              "status": "unknown",
              "version": "v20 R4",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "v20 R7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:4d:4d_server:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "v20_r3",
                  "versionStartIncluding": "*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:4d:4d_server:v20_r7:*:windows:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marcelo Reyes of SCHUTZWERK GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\u003cbr\u003e"
            }
          ],
          "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        },
        {
          "capecId": "CAPEC-497",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-497 File Discovery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-30T07:10:17.999Z",
        "orgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
        "shortName": "SCHUTZWERK"
      },
      "references": [
        {
          "url": "https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://4d.com"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to 4D Server 20 R7 or higher."
            }
          ],
          "value": "Update to 4D Server 20 R7 or higher."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-06-17T11:00:00.000Z",
          "value": "Vulnerability discovered"
        },
        {
          "lang": "en",
          "time": "2024-06-24T11:00:00.000Z",
          "value": "Attempt to contact vendor, no response received"
        },
        {
          "lang": "en",
          "time": "2024-06-25T11:00:00.000Z",
          "value": "CVE ID requested"
        },
        {
          "lang": "en",
          "time": "2024-06-29T14:59:00.000Z",
          "value": "CVE-2024-39847 assigned"
        },
        {
          "lang": "en",
          "time": "2024-07-04T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-09T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-16T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2024-07-22T11:00:00.000Z",
          "value": "Attempt to contact vendor again, no response received"
        },
        {
          "lang": "en",
          "time": "2026-04-29T11:00:00.000Z",
          "value": "Advisory published"
        }
      ],
      "title": "Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423",
    "assignerShortName": "SCHUTZWERK",
    "cveId": "CVE-2024-39847",
    "datePublished": "2026-04-30T07:10:17.999Z",
    "dateReserved": "2024-06-29T20:55:54.740Z",
    "dateUpdated": "2026-04-30T13:00:38.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-39847",
      "date": "2026-05-05",
      "epss": "0.00038",
      "percentile": "0.11275"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-39847\",\"sourceIdentifier\":\"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\",\"published\":\"2026-04-30T07:16:36.143\",\"lastModified\":\"2026-05-05T02:51:27.190\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"YES\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:server:20:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB9D8C6-82C3-4C82-92CC-36E27D0AEBC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:server:20:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C45F4F-AE28-4B0D-BCCC-648953FC9772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:server:20:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5512EA72-DE0B-4A44-AD7D-F8D277541F65\"}]}]}],\"references\":[{\"url\":\"https://4d.com\",\"source\":\"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\",\"tags\":[\"Product\"]},{\"url\":\"https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/\",\"source\":\"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-39847\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-30T13:00:30.372326Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-30T13:00:35.414Z\"}}], \"cna\": {\"title\": \"Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Marcelo Reyes of SCHUTZWERK GmbH\"}], \"impacts\": [{\"capecId\": \"CAPEC-664\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-664 Server Side Request Forgery\"}]}, {\"capecId\": \"CAPEC-497\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-497 File Discovery\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.7, \"Automatable\": \"YES\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"4D\", \"modules\": [\"4D Web Server\"], \"product\": \"4D Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"v20 R3\"}, {\"status\": \"unknown\", \"version\": \"v20 R4\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"v20 R6\"}, {\"status\": \"unaffected\", \"version\": \"v20 R7\", \"versionType\": \"custom\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-06-17T11:00:00.000Z\", \"value\": \"Vulnerability discovered\"}, {\"lang\": \"en\", \"time\": \"2024-06-24T11:00:00.000Z\", \"value\": \"Attempt to contact vendor, no response received\"}, {\"lang\": \"en\", \"time\": \"2024-06-25T11:00:00.000Z\", \"value\": \"CVE ID requested\"}, {\"lang\": \"en\", \"time\": \"2024-06-29T14:59:00.000Z\", \"value\": \"CVE-2024-39847 assigned\"}, {\"lang\": \"en\", \"time\": \"2024-07-04T11:00:00.000Z\", \"value\": \"Attempt to contact vendor again, no response received\"}, {\"lang\": \"en\", \"time\": \"2024-07-09T11:00:00.000Z\", \"value\": \"Attempt to contact vendor again, no response received\"}, {\"lang\": \"en\", \"time\": \"2024-07-16T11:00:00.000Z\", \"value\": \"Attempt to contact vendor again, no response received\"}, {\"lang\": \"en\", \"time\": \"2024-07-22T11:00:00.000Z\", \"value\": \"Attempt to contact vendor again, no response received\"}, {\"lang\": \"en\", \"time\": \"2026-04-29T11:00:00.000Z\", \"value\": \"Advisory published\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update to 4D Server 20 R7 or higher.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update to 4D Server 20 R7 or higher.\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/\"}, {\"url\": \"https://4d.com\", \"tags\": [\"product\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-611\", \"description\": \"CWE-611 Improper Restriction of XML External Entity Reference\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:4d:4d_server:*:*:windows:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"v20_r3\", \"versionStartIncluding\": \"*\"}, {\"criteria\": \"cpe:2.3:a:4d:4d_server:v20_r7:*:windows:*:*:*:*:*\", \"vulnerable\": false}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\", \"shortName\": \"SCHUTZWERK\", \"dateUpdated\": \"2026-04-30T07:10:17.999Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-39847\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-30T13:00:38.371Z\", \"dateReserved\": \"2024-06-29T20:55:54.740Z\", \"assignerOrgId\": \"23637b5d-af4c-4cf9-b8f6-deb7fd0f8423\", \"datePublished\": \"2026-04-30T07:10:17.999Z\", \"assignerShortName\": \"SCHUTZWERK\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…