An XML external entity (XXE) injection vulnerability in Magicpin v3.4 allows attackers to access sensitive database information via a crafted SVG file.
References
Link | Resource |
---|---|
https://gist.github.com/Mr-Akuma/4f6261007fcfbd96fa2c2d8ad4a5e1ca | Exploit Third Party Advisory |
https://magicpin.in/ | Vendor Advisory |
https://gist.github.com/Mr-Akuma/4f6261007fcfbd96fa2c2d8ad4a5e1ca | Exploit Third Party Advisory |
https://magicpin.in/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Mr-Akuma/4f6261007fcfbd96fa2c2d8ad4a5e1ca - Exploit, Third Party Advisory | |
References | () https://magicpin.in/ - Vendor Advisory |
Information
Published : 2022-06-14 03:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31447
Mitre link : CVE-2022-31447
CVE.ORG link : CVE-2022-31447
JSON object : View
Products Affected
magicpin
- magicpin
CWE
CWE-611
Improper Restriction of XML External Entity Reference