mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
18 lines
786 B
Markdown
18 lines
786 B
Markdown
![]() |
### [CVE-2018-19858](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19858)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
PrinceXML, versions 10 and below, is vulnerable to XXE due to the lack of protection against external entities. If an attacker passes HTML referencing an XML file (e.g., in an IFRAME element), PrinceXML will fetch the XML and parse it, thus giving an attacker file-read access and full-fledged SSRF.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.youtube.com/watch?v=-7YIzYtWhzM
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/nhthongDfVn/File-Converter-Exploit
|
||
|
|