cve/2016/CVE-2016-6256.md

19 lines
869 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-6256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6256)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SAP Business One for Android 1.2.3 allows remote attackers to conduct XML External Entity (XXE) attacks via crafted XML data in a request to B1iXcellerator/exec/soap/vP.001sap0003.in_WCSX/com.sap.b1i.vplatform.runtime/INB_WS_CALL_SYNC_XPT/INB_WS_CALL_SYNC_XPT.ipo/proc, aka SAP Security Note 2378065.
### POC
#### Reference
- http://packetstormsecurity.com/files/142597/SAP-Business-One-For-Android-1.2.3-XML-Injection.html
- https://www.exploit-db.com/exploits/42036/
#### Github
- https://github.com/ARPSyndicate/cvemon