Akamai CloudTest XXE Injection Vulnerability
漏洞信息
漏洞名称: Akamai CloudTest XXE Injection Vulnerability
漏洞编号:
- CVE: CVE-2025-49493
漏洞类型: XML实体注入
漏洞等级: 中危
漏洞描述: Akamai CloudTest是一款广泛使用的云测试平台,主要用于企业级服务的性能测试和安全评估。该平台通过模拟大量用户请求来测试Web应用和服务的稳定性和安全性,因此在企业和服务提供商中非常受欢迎。此次发现的XXE注入漏洞影响了版本60(构建12988)之前的所有Akamai CloudTest实例。
该漏洞属于XML外部实体注入(XXE)类型,其技术根源在于Akamai CloudTest在处理SOAP请求时,未能正确限制XML解析器对外部实体的处理。攻击者可以通过构造恶意的XML请求,利用SOAP端点(如/concerto/services/RepositoryService等)注入外部DTD,进而读取服务器上的本地文件内容。这种攻击不需要任何形式的认证或用户交互,使得风险大大增加。
从影响分析来看,此漏洞可能导致严重的安全风险,包括但不限于敏感信息泄露(如读取/etc/passwd文件)、服务器配置暴露等。由于攻击者可以远程利用此漏洞,且无需认证,因此该漏洞的潜在危害范围广泛,尤其是在未及时打补丁的环境中。此外,攻击者还可能利用此漏洞进行进一步的网络渗透,如利用泄露的信息进行更有针对性的攻击。因此,建议所有使用Akamai CloudTest的企业和服务提供商立即升级到版本60或更高版本,以防范潜在的安全威胁。
产品厂商: Akamai
产品名称: Akamai CloudTest
影响版本: version < 60 (build 12988)
来源: https://github.com/B1ack4sh/Blackash-CVE-2025-49493
类型: CVE-2025:github search
仓库文件
- README.md
来源概述
CVE-2025-49493 Akamai CloudTest - XXE Injection
📄 Description:
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
🛠️ Basic Information:
- Affected Product: Akamai CloudTest (prior to version 60 — build 12988, released June 2025)
- Vulnerability Type: XML External Entity Injection (XXE)
- CWE: CWE‑611 – Improper Restriction of XML External Entity
- Impact: Remote attackers can send crafted XML to read local files on the server without authentication or user interaction.
🔍 Technical Details:
- Vulnerable SOAP endpoints include:
1 |
|
1 |
|
- The flaw allows attackers to inject external DTDs (Document Type Definitions) and exploit XML parsers to leak local file content.
- Techniques such as error-based parsing and out-of-band (OOB) data exfiltration can be used.
📊 Severity:
- CVSS v3.1 Score: 5.8 (Medium 🟠)
- Attack Vector: Network
- Privileges Required: None
- User Interaction: None
- Impact: Confidentiality breach (e.g., reading
/etc/passwd
)
✅ Mitigation Steps:
- Update to CloudTest version 60 or later, where external entity parsing is disabled by default.
- Disable DTD processing in XML parsers manually if an upgrade isn’t possible.
- Restrict network access to CloudTest instances (e.g., via firewalls and IP allowlists).
- Monitor XML traffic for anomalies or known exploit patterns.
- Limit file access permissions for the CloudTest service to reduce impact.
- Deploy a WAF (Web Application Firewall) with rules against XXE attacks.
📅 Timeline:
- Vulnerability discovered: June 2025
- Fix released: Early July 2025
- Proof of Concept (PoC) exists publicly.
- No confirmed mass exploitation as of now.
✅ Summary Table:
Field | Details |
---|---|
Product | Akamai CloudTest < v60 |
CVSS Score | 5.8 (Medium) |
Exploitable | Remotely, no auth required |
Affected Feature | XML SOAP services |
Attack Technique | XXE via external DTDs |
Patch | Available in version 60 (June 2025) |
Risk | Disclosure of sensitive files |
⚠️ Disclaimer:
This PoC is provided for educational and research purposes only. Running this on any system without permission is illegal and unethical !!!