### [CVE-2024-55875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55875) ![](https://img.shields.io/static/v1?label=Product&message=http4k&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%205.41.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)&color=brightgreen) ### Description http4k is a functional toolkit for Kotlin HTTP applications. Prior to version 5.41.0.0, there is a potential XXE (XML External Entity Injection) vulnerability when http4k handling malicious XML contents within requests, which might allow attackers to read local sensitive information on server, trigger Server-side Request Forgery and even execute code under some circumstances. Version 5.41.0.0 contains a patch for the issue. ### POC #### Reference - https://github.com/http4k/http4k/security/advisories/GHSA-7mj5-hjjj-8rgw #### Github - https://github.com/JAckLosingHeart/CVE-2024-55875 - https://github.com/nomi-sec/PoC-in-GitHub