cve/2015/CVE-2015-1833.md

30 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-1833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1833)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.
### POC
#### Reference
- http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/37110/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/37110/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/0ang3el/aem-hacker
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/Raz0r/aemscan
- https://github.com/TheRipperJhon/AEMVS
- https://github.com/amarnathadapa-sec/aem
- https://github.com/andyacer/aemscan_edit
- https://github.com/seal-community/patches
- https://github.com/vulnerabilitylabs/aem-hacker