Share
## https://sploitus.com/exploit?id=DC72D5FB-6A34-5EE8-833A-8403AB75FF41
# CVE-2024-30043-XXE
# Credit

The impact of the vulnerability is limited at present, but thanks to https://x.com/chudyPB for providing a clever bypass idea.

>https://x.com/chudyPB

> https://www.zerodayinitiative.com/blog/2024/5/29/cve-2024-30043-abusing-url-parsing-confusion-to-exploit-xxe-on-sharepoint-server-and-cloud

>https://x.com/chudyPB/status/1797707100421751007

# Usage

change these:

![](https://cdn.jsdelivr.net/gh/W01fh4cker/blog_image@main/image-20240607023526043.png)

```shell
pip install requests requests_ntlm flask
python CVE-2024-30043-XXE.py
```

test on `Microsoft Sharepoint Server 2019`(`16.0.10409.20027`):

![](https://cdn.jsdelivr.net/gh/W01fh4cker/blog_image@main/image-20240607023535435.png)