diff --git a/http/cves/2024/CVE-2024-6893.yaml b/http/cves/2024/CVE-2024-6893.yaml index 5f1d30ad19..f1d964bf62 100644 --- a/http/cves/2024/CVE-2024-6893.yaml +++ b/http/cves/2024/CVE-2024-6893.yaml @@ -1,16 +1,16 @@ id: CVE-2024-6893 info: - name: Journyx - XML External Entities Injection + name: Journyx - XML External Entities Injection (XXE) author: s4eio severity: high description: | The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2024-6893 - https://securityforeveryone.com/tools/journyx-xxe-cve-2024-6893 - https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt - https://packetstormsecurity.com/files/180005/Journyx-11.5.4-XML-Injection.html + - https://nvd.nist.gov/vuln/detail/CVE-2024-6893 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 @@ -21,7 +21,7 @@ info: vendor: journyx product: journyx-jtime fofa-query: icon_hash="-109972155" - tags: cve,cve2024,journyx + tags: cve,cve2024,journyx,xxe variables: pass: "{{rand_text_alpha(5)}}" @@ -41,6 +41,8 @@ http: part: body regex: - 'root:.*:0:0:' + - 'invalid password for user' + condition: and - type: word part: header