Goby/json/WebLogic-XML-External-Entit...

70 lines
2.7 KiB
JSON
Raw Normal View History

2022-11-25 02:08:58 -08:00
{
"Name": "WebLogic XML External Entity (XXE) Injection (CVE-2019-2647)",
"Description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data.",
"Product": "WebLogic",
"Homepage": "https://www.oracle.com/java/weblogic/",
"DisclosureDate": "2022-01-19",
"Author": "su18@javaweb.org",
"FofaQuery": "app=\"BEA-WebLogic-Server\" || app=\"Oracle-Weblogic_interface_7001\"",
"GobyQuery": "app=\"BEA-WebLogic-Server\" || app=\"Oracle-Weblogic_interface_7001\"",
"Level": "3",
"Impact": "XML External Entity (XXE) Injection",
"Recommendation": "It is recommended that users update the weblogic to the latest version.",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-2647"
],
"Translation": {
"CN": {
"Name": "WebLogic XXE 注入漏洞 CVE-2019-2647",
"VulType": [
"XXE漏洞"
],
"Tags": [
"XXE漏洞"
],
"Description": "<p>北京时间4月26日Oracle官方发布的4月关键补丁更新CPUCritical Patch Update中修复了若干个高危的WebLogic XXE 漏洞。</p><p>该漏洞允许未经身份验证的攻击者通过T3协议网络访问并破坏易受攻击的WebLogic Server成功的漏洞利用可导致攻击者从WebLogic服务器中读取所有的文件或敏感信息。<br></p>",
"Impact": "<p>该漏洞允许未经身份验证的攻击者通过T3协议网络访问并破坏易受攻击的WebLogic Server成功的漏洞利用可导致攻击者从WebLogic服务器中读取所有的文件或敏感信息。<br></p>",
"Product": "Weblogic",
"Recommendation": "<p>建议用户使用新版 weblogic或安装官方安全更新补丁。<br></p>"
}
},
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "xmlUrl",
"type": "input",
"value": "malicious xml url, like: http://1.1.1.1/evil.dtd "
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": null,
"ExploitSteps": null,
"Tags": [
"xxe"
],
"VulType": [
"xxe"
],
"CVEIDs": [
"CVE-2019-2647"
],
"CNNVD": [
"CNNVD-201904-711"
],
"CNVD": [
""
],
"CVSSScore": "7.5",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}