VYPR
Critical severity9.9NVD Advisory· Published Oct 10, 2017· Updated May 13, 2026

CVE-2017-13706

CVE-2017-13706

Description

XML external entity (XXE) vulnerability in the import package functionality of the deployment module in Lansweeper before 6.0.100.67 allows remote authenticated users to obtain sensitive information, cause a denial of service, conduct server-side request forgery (SSRF) attacks, conduct internal port scans, or have unspecified other impact via an XML request, aka bug #572705.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

XXE in Lansweeper deployment module before 6.0.100.67 allows remote authenticated users to disclose sensitive data, cause DoS, SSRF, and port scans.

Vulnerability

Lansweeper versions prior to 6.0.100.67 are affected by an XML External Entity (XXE) vulnerability in the import package functionality of the deployment module. The issue resides in /deployment/DeploymentActions.aspx with the action=importPackage parameter. An authenticated remote user can exploit this by sending a crafted XML payload via a POST request containing a reference to an external entity. The vulnerable versions include 6.0.100.29 and all earlier releases [1][2].

Exploitation

An attacker must have valid user credentials to access the Lansweeper web interface. They then send a POST request to /deployment/DeploymentActions.aspx?action=importPackage with a multipart/form-data body containing an XML payload that defines an external entity. The entity can point to a local file, an internal service, or an external server. No additional user interaction is required; the XML is processed server-side when the import package action is triggered [2].

Impact

Successful exploitation leads to multiple severe outcomes: disclosure of sensitive information from the server's file system, denial of service (via entity expansion), server-side request forgery (SSRF) allowing internal network reconnaissance, and port scanning from the Lansweeper server's perspective. The attacker can potentially gain access to internal resources and data that should be isolated [1][2].

Mitigation

The vulnerability is fixed in Lansweeper version 6.0.100.67, which was released prior to the public disclosure date of October 6, 2017. The vendor's changelog indicates that this update addresses security issues, but specific details are not publicly available. Users should upgrade to version 6.0.100.67 or later immediately. No workaround is provided for unpatched versions [3].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.