CVE-2018-25142
XXE Injection in NovaRad NovaPACS Viewer Allows File Disclosure
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| novarad | novapacs_diagnostics_viewer | 8.5.19.75 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to retrieve arbitrary system files and potentially sensitive information from the affected system. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and health information against unauthorized access and disclosure. [2, 3]
Can you explain this vulnerability to me?
CVE-2018-25142 is an unauthenticated XML External Entity (XXE) injection vulnerability in NovaRad NovaPACS Diagnostics Viewer version 8.5.19.75. It occurs during the import of XML preference settings, where attackers can craft malicious XML files using DTD parameter entities to exploit the system. This allows attackers to retrieve arbitrary system files through an out-of-band (OOB) channel by making the application process external XML entities, leading to unauthorized data disclosure. [2, 3]
How can this vulnerability impact me? :
This vulnerability can lead to the exposure and retrieval of arbitrary files from the affected system, including sensitive system and user data. Attackers can exploit it without authentication, potentially causing significant data disclosure. Additionally, it may lead to denial of service (DoS) conditions. The ability to access sensitive files poses a serious security risk to the confidentiality and integrity of the system running NovaPACS Diagnostics Viewer. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to import specially crafted malicious XML files that exploit the XML External Entity (XXE) injection in the NovaRad NovaPACS Diagnostics Viewer 8.5.19.75. A proof-of-concept involves crafting an XML file with external DTD parameter entities that trigger out-of-band HTTP requests to an attacker-controlled server. Monitoring network traffic for unusual HTTP GET requests to unknown external servers during XML import operations can help detect exploitation attempts. For detection, you can use network monitoring tools like Wireshark or tcpdump to capture outbound HTTP requests when importing XML preferences. Additionally, testing with crafted XML files similar to the PoC can confirm vulnerability presence. Example commands include: 1) Using tcpdump to monitor HTTP traffic on port 80 or 8080: `tcpdump -i <interface> tcp port 80 or tcp port 8080 -w capture.pcap` 2) Using curl or similar tools to test XML import with crafted payloads (requires application-specific import commands). [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Disabling or restricting the XML preference import functionality in NovaRad NovaPACS Diagnostics Viewer until a patch or update is available. 2) Implementing network-level controls to block outbound HTTP requests from the affected system to untrusted external servers, preventing out-of-band data exfiltration. 3) Monitoring and alerting on unusual outbound network traffic patterns during XML import operations. 4) Applying any available vendor patches or updates once released. Since the vulnerability allows unauthenticated attackers to retrieve arbitrary files, limiting the application's network access and usage of XML imports is critical. [2, 3]