| 
 | 
SEC Consult Security Advisory < 20090305-0 >
=======================================================================                  title: NextApp Echo XML Injection Vulnerability
                program: NextApp Echo
     vulnerable version: Echo2 < 2.1.1
homepage: http://echo.nextapp.com/site/echo2 
                  found: Feb. 2008
                     by: Anonymous / SEC Consult Vulnerability Lab
         permanent link:
http://www.sec-consult.com/files/20090305-0_echo_nextapp_xml_injection.txt 
=======================================================================
Vendor description:
-------------------
Echo is a platform for building web-based applications that approach the
capabilities of rich clients. The applications are developed using a
component-oriented and event-driven API, eliminating the need to deal
with the "page-based" nature of browsers. To the developer, Echo works
just like a user interface toolkit.
Vulnerability overview:
-----------------------
Unverified XML Data is passed from the client (Webbrowser) to the
NextApp Echo Engine  and consequently to an underlying XML Parser. This
leading to a typical XML Injection scenario.
Vulnerability description:
--------------------------
All XML requests for the framework are created by javascript and than
sent to the Server via POST HTTP requests. 
A typical requests would look like the following:
---cut here---