CVE-2024-6893
HIGH EXPLOITED NUCLEIJournyx soap_cgi.pyc - XML External Entity Reference
Title source: llmDescription
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
Nuclei Templates (1)
Journyx - XML External Entities Injection (XXE)
HIGHby s4e-io
FOFA:
icon_hash="-109972155"
Scores
CVSS v3
7.5
EPSS
0.9139
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-09-04
CWE
CWE-611
Status
published
Products (1)
journyx/journyx
11.5.4
Published
Aug 08, 2024
Tracked Since
Feb 18, 2026