The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 08 Aug 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Journyx
Journyx journyx |
|
| CPEs | cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:* | |
| Vendors & Products |
Journyx
Journyx journyx |
Thu, 08 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 08 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 07 Aug 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources. | |
| Title | Journyx Unauthenticated XML External Entities Injection | |
| Weaknesses | CWE-611 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2024-08-08T13:14:39.692Z
Reserved: 2024-07-18T19:25:52.422Z
Link: CVE-2024-6893
Updated: 2024-08-08T01:29:17.480Z
Status : Modified
Published: 2024-08-08T00:15:40.793
Modified: 2024-11-21T09:50:29.000
Link: CVE-2024-6893
No data.
OpenCVE Enrichment
No data.
Weaknesses