-
Notifications
You must be signed in to change notification settings - Fork 179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Magento CosmicSting XXE (CVE-2024-34102) Detector #538
base: master
Are you sure you want to change the base?
Conversation
.../main/java/com/google/tsunami/plugins/detectors/cves/cve202434102/MagentoCosmicStingXxe.java
Outdated
Show resolved
Hide resolved
.../main/java/com/google/tsunami/plugins/detectors/cves/cve202434102/MagentoCosmicStingXxe.java
Outdated
Show resolved
Hide resolved
...t/java/com/google/tsunami/plugins/detectors/cves/cve202434102/MagentoCosmicStingXxeTest.java
Outdated
Show resolved
Hide resolved
...google/tsunami/plugins/detectors/cves/cve202434102/MagentoCosmicStingXxeBootstrapModule.java
Outdated
Show resolved
Hide resolved
...google/tsunami/plugins/detectors/cves/cve202434102/MagentoCosmicStingXxeBootstrapModule.java
Outdated
Show resolved
Hide resolved
@maoning done. Just a reminder that |
Could you create a separate PR to commit this file to https://github.com/google/tsunami-security-scanner-plugins/tree/master/payloads? |
Here it is: #553 I proceeded to change the path in the detector already to what will be the new URL, so it can be tested as soon as the payload PR is merged. |
Hello,
Here's the detector implementation for the Adobe Commerce/Magento CosmicSting XXE (CVE-2024-34102) detector. Testbed PR here: google/security-testbeds#89
A few notes:
DTD_FILE_URL
here will need to be updated before merging the PR so that it references the right repo/branch/etc/passwd
are sent as a base64-encoded URL parameter when performing the callback request. However, with the current TCS implementation there is no way to retrieve the request's body, it's only possible to know whether a callback was received or not, so Tsunami can't actually read the exfiltrated data. Still, a safe instance would not send a request at all, therefore this is still a good indicator of a vulnerable instance.References: