{"api_version":"1","generated_at":"2026-04-24T02:59:10+00:00","cve":"CVE-2019-11216","urls":{"html":"https://cve.report/CVE-2019-11216","api":"https://cve.report/api/cve/CVE-2019-11216.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-11216","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-11216"},"summary":{"title":"CVE-2019-11216","description":"BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-12-04 20:15:00","updated_at":"2019-12-13 21:37:00"},"problem_types":["CWE-611","CWE-434"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Dec/7","name":"http://seclists.org/fulldisclosure/2019/Dec/7","refsource":"MISC","tags":["Exploit","Mailing List","Third Party Advisory"],"title":"Full Disclosure: XXE in BMC Smart Reporting 7.3 20180418 - CVE-2019-11216","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html","name":"https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html","refsource":"MISC","tags":["Product"],"title":"Export and import repository - Documentation for Remedy IT Service Management Suite 9.0 - BMC Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html","name":"http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html","refsource":"MISC","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"BMC Smart Reporting 7.3 20180418 XML Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-11216","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11216","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"11216","vulnerable":"1","versionEndIncluding":"18.05.05","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bmc","cpe5":"remedy_smart_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11216","vulnerable":"1","versionEndIncluding":"19.02.01","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bmc","cpe5":"remedy_smart_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11216","vulnerable":"1","versionEndIncluding":"9.1.03.001","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bmc","cpe5":"remedy_smart_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11216","vulnerable":"1","versionEndIncluding":"9.1.04.002","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bmc","cpe5":"remedy_smart_reporting","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-11216","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html","refsource":"MISC","name":"https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html"},{"refsource":"MISC","name":"http://seclists.org/fulldisclosure/2019/Dec/7","url":"http://seclists.org/fulldisclosure/2019/Dec/7"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html","url":"http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html"}]}},"nvd":{"publishedDate":"2019-12-04 20:15:00","lastModifiedDate":"2019-12-13 21:37:00","problem_types":["CWE-611","CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.03","versionEndIncluding":"9.1.03.001","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.04","versionEndIncluding":"9.1.04.002","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"18.05","versionEndIncluding":"18.05.05","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bmc:remedy_smart_reporting:*:*:*:*:*:*:*:*","versionStartIncluding":"19.02","versionEndIncluding":"19.02.01","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"11216","Ordinal":"149502","Title":"CVE-2019-11216","CVE":"CVE-2019-11216","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"11216","Ordinal":"1","NoteData":"BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"11216","Ordinal":"2","NoteData":"2019-12-04","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"11216","Ordinal":"3","NoteData":"2019-12-04","Type":"Other","Title":"Modified"}]}}}