{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2024-39847", "assignerOrgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423", "state": "PUBLISHED", "assignerShortName": "SCHUTZWERK", "dateReserved": "2024-06-29T20:55:54.740Z", "datePublished": "2026-04-30T07:10:17.999Z", "dateUpdated": "2026-04-30T13:00:38.371Z" }, "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "4D Web Server" ], "platforms": [ "Windows" ], "product": "4D Server", "vendor": "4D", "versions": [ { "lessThanOrEqual": "v20 R3", "status": "affected", "version": "*", "versionType": "custom" }, { "lessThanOrEqual": "v20 R6", "status": "unknown", "version": "v20 R4", "versionType": "custom" }, { "status": "unaffected", "version": "v20 R7", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:4d:4d_server:*:*:windows:*:*:*:*:*", "versionEndIncluding": "v20_r3", "versionStartIncluding": "*", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:4d_server:v20_r7:*:windows:*:*:*:*:*", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "OR" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Marcelo Reyes of SCHUTZWERK GmbH" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.
" } ], "value": "Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services." } ], "impacts": [ { "capecId": "CAPEC-664", "descriptions": [ { "lang": "en", "value": "CAPEC-664 Server Side Request Forgery" } ] }, { "capecId": "CAPEC-497", "descriptions": [ { "lang": "en", "value": "CAPEC-497 File Discovery" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "exploitMaturity": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "orgId": "23637b5d-af4c-4cf9-b8f6-deb7fd0f8423", "shortName": "SCHUTZWERK", "dateUpdated": "2026-04-30T07:10:17.999Z" }, "references": [ { "url": "https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-002/" }, { "tags": [ "product" ], "url": "https://4d.com" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4D Server 20 R7 or higher." } ], "value": "Update to 4D Server 20 R7 or higher." } ], "source": { "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-17T11:00:00.000Z", "value": "Vulnerability discovered" }, { "lang": "en", "time": "2024-06-24T11:00:00.000Z", "value": "Attempt to contact vendor, no response received" }, { "lang": "en", "time": "2024-06-25T11:00:00.000Z", "value": "CVE ID requested" }, { "lang": "en", "time": "2024-06-29T14:59:00.000Z", "value": "CVE-2024-39847 assigned" }, { "lang": "en", "time": "2024-07-04T11:00:00.000Z", "value": "Attempt to contact vendor again, no response received" }, { "lang": "en", "time": "2024-07-09T11:00:00.000Z", "value": "Attempt to contact vendor again, no response received" }, { "lang": "en", "time": "2024-07-16T11:00:00.000Z", "value": "Attempt to contact vendor again, no response received" }, { "lang": "en", "time": "2024-07-22T11:00:00.000Z", "value": "Attempt to contact vendor again, no response received" }, { "lang": "en", "time": "2026-04-29T11:00:00.000Z", "value": "Advisory published" } ], "title": "Arbitrary File Read and Server Side Request Forgery via XML External Entities in 4D Server SOAP", "x_generator": { "engine": "Vulnogram 0.2.0" } }, "adp": [ { "metrics": [ { "other": { "type": "ssvc", "content": { "timestamp": "2026-04-30T13:00:30.372326Z", "id": "CVE-2024-39847", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "version": "2.0.3" } } } ], "title": "CISA ADP Vulnrichment", "providerMetadata": { "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2026-04-30T13:00:38.371Z" } } ] } }