CVE-2024-6893

HIGH EXPLOITED NUCLEI

Journyx soap_cgi.pyc - XML External Entity Reference

Title source: llm

Description

The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.

Nuclei Templates (1)

Journyx - XML External Entities Injection (XXE)
HIGHby s4e-io
FOFA: icon_hash="-109972155"

Scores

CVSS v3 7.5
EPSS 0.9139
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-09-04
CWE
CWE-611
Status published
Products (1)
journyx/journyx 11.5.4
Published Aug 08, 2024
Tracked Since Feb 18, 2026