Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6893 PoC — Journyx 代码问题漏洞

Source
Associated Vulnerability
Title:Journyx 代码问题漏洞 (CVE-2024-6893)
Description:Journyx是Journyx公司的一款基于云的时间跟踪软件。 Journyx 11.5.4版本存在代码问题漏洞,该漏洞源于允许SOAP请求的XML主体包含对外部实体的引用,未经身份验证的攻击者可以读取本地文件、执行服务器端请求伪造并压垮Web服务器资源。
Description
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
File Snapshot

id: CVE-2024-6893 info: name: Journyx - XML External Entities Injection (XXE) author: s4e-io ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.