CVE-2024-6893
Journyx Unauthenticated XML External Entities Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
El controlador API "soap_cgi.pyc" permite que el cuerpo XML de las solicitudes SOAP contenga referencias a entidades externas. Esto permite que un atacante no autenticado lea archivos locales, falsifique solicitudes del lado del servidor y abrume los recursos del servidor web.
Journyx version 11.5.4 has an issue where the soap_cgi.pyc API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-07-18 CVE Reserved
- 2024-08-07 CVE Published
- 2024-08-08 CVE Updated
- 2024-08-17 First Exploit
- 2024-10-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/codeb0ss/CVE-2024-6893-PoC | 2024-08-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Journyx Search vendor "Journyx" | Journyx (jtime) Search vendor "Journyx" for product "Journyx (jtime)" | 11.5.4 Search vendor "Journyx" for product "Journyx (jtime)" and version "11.5.4" | en |
Affected
|