Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-11991

Severity
7.5HIGH
EPSS
93.1%
top 0.20%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 11
Latest updateMay 24

Description

When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDapache/cocoon2.12.1.12
CVEListV5apache_cocoonApache Cocoon 2.1.0 to 2.1.12

🔴Vulnerability Details

3
GHSA
GHSA-586v-g7r5-mhgp: When using the StreamGenerator, the code parse a user-provided XML2022-05-24
CVEList
CVE-2020-11991: When using the StreamGenerator, the code parse a user-provided XML2020-09-11
VulnCheck
Apache cocoon Improper Restriction of XML External Entity Reference2020

💥Exploits & PoCs

1
Nuclei
Apache Cocoon 2.1.12 - XML Injection

🔍Detection Rules

1
Suricata
ET EXPLOIT Apache Cocoon <= 2.1.x LFI (CVE-2020-11991)2021-08-02