An XML External Entity (XXE) vulnerability in urule v2.1.7 allows attackers to execute arbitrary code via uploading a crafted XML file to /urule/common/saveFile.
References
Link | Resource |
---|---|
https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24189.md | Exploit Third Party Advisory |
https://github.com/youseries/urule | Product |
https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24189.md | Exploit Third Party Advisory |
https://github.com/youseries/urule | Product |
Configurations
History
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24189.md - Exploit, Third Party Advisory | |
References | () https://github.com/youseries/urule - Product | |
Summary |
|
Information
Published : 2023-02-24 22:15
Updated : 2025-03-12 15:15
NVD link : CVE-2023-24189
Mitre link : CVE-2023-24189
CVE.ORG link : CVE-2023-24189
JSON object : View
Products Affected
bstek
- urule
CWE
CWE-611
Improper Restriction of XML External Entity Reference