No advisories yet.
Solution
Update to Lobster_pro release 4.12.6-GA or higher.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.schutzwerk.com/en/blog/schutzwerk-sa-2024-005/ |
|
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro prior to version 4.12.6-GA. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services. | |
| Title | Arbitrary File Read and Server Side Request Forgery via XML External Entities in Lobster_pro | |
| First Time appeared |
Lobster Gmbh
Lobster Gmbh lobster Pro |
|
| Weaknesses | CWE-611 | |
| CPEs | cpe:2.3:a:lobster_gmbh:lobster_pro:*:*:windows:*:*:*:*:* cpe:2.3:a:lobster_gmbh:lobster_pro:4.12.6-ga:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Lobster Gmbh
Lobster Gmbh lobster Pro |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SCHUTZWERK
Published:
Updated: 2026-04-30T13:15:37.670Z
Reserved: 2025-07-03T09:19:50.254Z
Link: CVE-2024-13971
Updated: 2026-04-30T13:15:33.919Z
Status : Received
Published: 2026-04-30T13:16:02.680
Modified: 2026-04-30T13:16:02.680
Link: CVE-2024-13971
No data.
OpenCVE Enrichment
No data.