Axway SecureTransport versions 5.x through 5.3 have a disputed unauthenticated blind XML injection vulnerability. Learn about the impact, affected systems, and mitigation steps.
Axway SecureTransport versions 5.x through 5.3 (or 5.x through 5.5 with specific API configuration) have a potential security flaw that allows unauthenticated blind XML injection, as well as XXE, in the resetPassword feature through the REST API. Exploiting this vulnerability has the potential to result in disclosure of local files, denial of service, or invocation of URIs leading to server-side request forgery and subsequent remote code execution. The vendor disputes the existence of this vulnerability, claiming that the implementation already blocks all attacks utilizing external entities and denies server-side request forgery attacks.
Understanding CVE-2019-14277
This CVE involves a disputed vulnerability in Axway SecureTransport versions 5.x through 5.3, potentially allowing unauthenticated blind XML injection and XXE.
What is CVE-2019-14277?
The Impact of CVE-2019-14277
Technical Details of CVE-2019-14277
Axway SecureTransport vulnerability details and affected systems.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2019-14277 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates