.. / CVE-2020-11991

Exploit for Apache Cocoon 2.1.12 - XML Injection (CVE-2020-11991)

Description:

Apache Cocoon 2.1.12 is susceptible to XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.

Nuclei Template

View the template here CVE-2020-11991.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-11991.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E
https://github.com/H4ckTh3W0r1d/Goby_POC
https://nvd.nist.gov/vuln/detail/CVE-2020-11991
https://lists.apache.org/thread/6xg5j4knfczwdhggo3t95owqzol37k1b