CVE-2024-6893 Vulnerability Details
/
/
/
CVE-2024-6893 Metadata Quick Info
CVE Published: 07/08/2024 |
CVE Updated: 08/08/2024 |
CVE Year: 2024
Source: KoreLogic |
Vendor: Journyx |
Product: Journyx (jtime)
Status : PUBLISHED
CVE-2024-6893 Description
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
Metrics
CVSS Version: 3.1 |
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID: CWE-611
CWE Name: CWE-611 Improper Restriction of XML External Entity Reference
Source: Journyx
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).