The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 08 Aug 2024 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Journyx
         Journyx journyx  | 
|
| CPEs | cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:* | |
| Vendors & Products | 
        
        Journyx
         Journyx journyx  | 
Thu, 08 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
  | 
Thu, 08 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 07 Aug 2024 23:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources. | |
| Title | Journyx Unauthenticated XML External Entities Injection | |
| Weaknesses | CWE-611 | |
| References | 
         | 
Status: PUBLISHED
Assigner: KoreLogic
Published: 2024-08-07T23:22:08.667Z
Updated: 2024-08-08T13:14:39.692Z
Reserved: 2024-07-18T19:25:52.422Z
Link: CVE-2024-6893
Updated: 2024-08-08T01:29:17.480Z
Status : Modified
Published: 2024-08-08T00:15:40.793
Modified: 2024-11-21T09:50:29.000
Link: CVE-2024-6893
No data.