CVE-2017-13706
Description
XML external entity (XXE) vulnerability in the import package functionality of the deployment module in Lansweeper before 6.0.100.67 allows remote authenticated users to obtain sensitive information, cause a denial of service, conduct server-side request forgery (SSRF) attacks, conduct internal port scans, or have unspecified other impact via an XML request, aka bug #572705.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
XXE in Lansweeper deployment module before 6.0.100.67 allows remote authenticated users to disclose sensitive data, cause DoS, SSRF, and port scans.
Vulnerability
Lansweeper versions prior to 6.0.100.67 are affected by an XML External Entity (XXE) vulnerability in the import package functionality of the deployment module. The issue resides in /deployment/DeploymentActions.aspx with the action=importPackage parameter. An authenticated remote user can exploit this by sending a crafted XML payload via a POST request containing a reference to an external entity. The vulnerable versions include 6.0.100.29 and all earlier releases [1][2].
Exploitation
An attacker must have valid user credentials to access the Lansweeper web interface. They then send a POST request to /deployment/DeploymentActions.aspx?action=importPackage with a multipart/form-data body containing an XML payload that defines an external entity. The entity can point to a local file, an internal service, or an external server. No additional user interaction is required; the XML is processed server-side when the import package action is triggered [2].
Impact
Successful exploitation leads to multiple severe outcomes: disclosure of sensitive information from the server's file system, denial of service (via entity expansion), server-side request forgery (SSRF) allowing internal network reconnaissance, and port scanning from the Lansweeper server's perspective. The attacker can potentially gain access to internal resources and data that should be isolated [1][2].
Mitigation
The vulnerability is fixed in Lansweeper version 6.0.100.67, which was released prior to the public disclosure date of October 6, 2017. The vendor's changelog indicates that this update addresses security issues, but specific details are not publicly available. Users should upgrade to version 6.0.100.67 or later immediately. No workaround is provided for unpatched versions [3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/144527/Lansweeper-6.0.100.29-XXE-Injection.htmlnvdThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2017/Oct/14nvdMailing ListThird Party Advisory
- www.lansweeper.com/changelog.aspxnvdRelease NotesVendor Advisory
News mentions
0No linked articles in our index yet.