CVE-2024-39847
Analyzed Analyzed - Analysis Complete
Unauthenticated File Read in 4D Server SOAP Endpoints

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: SCHUTZWERK

Description
Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
4d server 20
4d server 20
4d server 20
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-611 The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the XML parser functionality of the SOAP endpoints in 4D Server. Unauthenticated attackers can exploit it by sending malicious XML payloads to the /4DSOAP endpoint, which processes external XML entities improperly. This allows attackers to read arbitrary files on the application server and adjacent network shares.

Additionally, attackers can perform HTTP GET requests to arbitrary services, enabling Server-Side Request Forgery (SSRF) attacks. The vulnerability is classified as CWE-611 (Improper Restriction of XML External Entity Reference) and affects 4D Server version 20 R3.

Exploitation techniques include error-based and out-of-band exfiltration methods, and the vulnerability remains exploitable even if the 'Reject SOAP-Requests' option is enabled in the 4D Server GUI.


How can this vulnerability impact me? :

This vulnerability can have serious impacts as it allows unauthenticated attackers to gain read access to sensitive files on the application server and connected network shares.

Attackers can also perform HTTP GET requests to arbitrary services, potentially enabling them to access internal services that are not normally exposed externally.

Such unauthorized access can lead to data leakage, exposure of confidential information, and facilitate further attacks within the network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending malicious XML payloads to the /4DSOAP endpoint of the 4D Server and observing if the server processes external XML entities, which would indicate susceptibility to XML External Entity (XXE) attacks.

A proof-of-concept script named 4d-xxe.py exists that automates the exploitation process and can be used to test if the server is vulnerable.

Detection involves monitoring for unusual HTTP GET requests initiated by the server to arbitrary services or attempts to read files on the application server or adjacent network shares.

  • Use the 4d-xxe.py script to send crafted XML payloads to the /4DSOAP endpoint.
  • Monitor network traffic for unexpected outbound HTTP GET requests originating from the 4D Server.
  • Check server logs for abnormal file read attempts or errors related to XML parsing at the /4DSOAP endpoint.

What immediate steps should I take to mitigate this vulnerability?

The recommended immediate mitigation is to upgrade the 4D Server to version 20 R7 or higher, where the vulnerability has been addressed.

Note that enabling the "Reject SOAP-Requests" option in the 4D Server GUI does not prevent exploitation, so relying on this setting is insufficient.

Until an upgrade can be performed, consider restricting access to the /4DSOAP endpoint to trusted networks or IP addresses to reduce exposure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to read arbitrary files on the application server and adjacent network shares, potentially exposing sensitive data.

Such unauthorized data access can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

Therefore, exploitation of this vulnerability could result in non-compliance with these standards due to unauthorized disclosure of protected data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart