CWE-611
Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
CVE-2012-1102 (GCVE-0-2012-1102)
Vulnerability from cvelistv5
Published
2021-07-09 10:42
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | perl-xml-atom |
Version: perl-xml-atom 0.39 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://seclists.org/oss-sec/2012/q1/549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "perl-xml-atom", "vendor": "n/a", "versions": [ { "status": "affected", "version": "perl-xml-atom 0.39" } ] } ], "descriptions": [ { "lang": "en", "value": "It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-09T10:42:36", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes" }, { "tags": [ "x_refsource_MISC" ], "url": "https://seclists.org/oss-sec/2012/q1/549" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "perl-xml-atom", "version": { "version_data": [ { "version_value": "perl-xml-atom 0.39" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611" } ] } ] }, "references": { "reference_data": [ { "name": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes", "refsource": "MISC", "url": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes" }, { "name": "https://seclists.org/oss-sec/2012/q1/549", "refsource": "MISC", "url": "https://seclists.org/oss-sec/2012/q1/549" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1102", "datePublished": "2021-07-09T10:42:36", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-125087 (GCVE-0-2014-125087)
Vulnerability from cvelistv5
Published
2023-02-19 16:31
Modified
2025-02-13 16:27
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | java-xmlbuilder |
Version: 1.0 Version: 1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:10:56.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.221480" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.221480" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://github.com/jmurty/java-xmlbuilder/issues/6" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240208-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "java-xmlbuilder", "vendor": "n/a", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in java-xmlbuilder bis 1.1 ausgemacht. Davon betroffen ist unbekannter Code. Mittels Manipulieren mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.2 vermag dieses Problem zu l\u00f6sen. Der Patch wird als e6fddca201790abab4f2c274341c0bb8835c3e73 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.2, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-08T10:06:09.619Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.221480" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.221480" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/jmurty/java-xmlbuilder/issues/6" }, { "tags": [ "patch" ], "url": "https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73" }, { "tags": [ "patch" ], "url": "https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2" }, { "url": "https://security.netapp.com/advisory/ntap-20240208-0009/" } ], "timeline": [ { "lang": "en", "time": "2023-02-18T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-02-18T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-02-18T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-03-23T09:00:59.000Z", "value": "VulDB entry last update" } ], "title": "java-xmlbuilder xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2014-125087", "datePublished": "2023-02-19T16:31:03.100Z", "dateReserved": "2023-02-18T12:59:37.929Z", "dateUpdated": "2025-02-13T16:27:12.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-10029 (GCVE-0-2015-10029)
Vulnerability from cvelistv5
Published
2023-01-07 19:36
Modified
2025-04-09 14:46
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability classified as problematic was found in kelvinmo simplexrd up to 3.1.0. This vulnerability affects unknown code of the file simplexrd/simplexrd.class.php. The manipulation leads to xml external entity reference. Upgrading to version 3.1.1 is able to address this issue. The patch is identified as 4c9f2e028523ed705b555eca2c18c64e71f1a35d. It is recommended to upgrade the affected component. VDB-217630 is the identifier assigned to this vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.217630" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.217630" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/kelvinmo/simplexrd/commit/4c9f2e028523ed705b555eca2c18c64e71f1a35d" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/kelvinmo/simplexrd/releases/tag/v3.1.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2015-10029", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:45:56.299130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:46:17.975Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "simplexrd", "vendor": "kelvinmo", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in kelvinmo simplexrd up to 3.1.0. This vulnerability affects unknown code of the file simplexrd/simplexrd.class.php. The manipulation leads to xml external entity reference. Upgrading to version 3.1.1 is able to address this issue. The patch is identified as 4c9f2e028523ed705b555eca2c18c64e71f1a35d. It is recommended to upgrade the affected component. VDB-217630 is the identifier assigned to this vulnerability." }, { "lang": "de", "value": "In kelvinmo simplexrd bis 3.1.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei simplexrd/simplexrd.class.php. Mittels Manipulieren mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 3.1.1 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 4c9f2e028523ed705b555eca2c18c64e71f1a35d bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.9, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T07:54:11.358Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.217630" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.217630" }, { "tags": [ "patch" ], "url": "https://github.com/kelvinmo/simplexrd/commit/4c9f2e028523ed705b555eca2c18c64e71f1a35d" }, { "tags": [ "patch" ], "url": "https://github.com/kelvinmo/simplexrd/releases/tag/v3.1.1" } ], "timeline": [ { "lang": "en", "time": "2023-01-07T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-01-07T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-01-07T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-01-30T02:39:24.000Z", "value": "VulDB entry last update" } ], "title": "kelvinmo simplexrd simplexrd.class.php xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2015-10029", "datePublished": "2023-01-07T19:36:40.427Z", "dateReserved": "2023-01-07T19:36:31.902Z", "dateUpdated": "2025-04-09T14:46:17.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-10082 (GCVE-0-2015-10082)
Vulnerability from cvelistv5
Published
2023-02-21 07:00
Modified
2024-08-06 08:58
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.221499" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.221499" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "modules": [ "XML Handler" ], "product": "libplist", "vendor": "UIKit0", "versions": [ { "status": "affected", "version": "1.12" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in UIKit0 libplist 1.12 entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion plist_from_xml der Datei src/xplist.c der Komponente XML Handler. Durch die Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Patch wird als c086cb139af7c82845f6d565e636073ff4b37440 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.2, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T08:58:52.317Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.221499" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.221499" }, { "tags": [ "patch" ], "url": "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440" } ], "timeline": [ { "lang": "en", "time": "2023-02-19T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-02-19T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-02-19T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-03-23T11:08:47.000Z", "value": "VulDB entry last update" } ], "title": "UIKit0 libplist XML xplist.c plist_from_xml xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2015-10082", "datePublished": "2023-02-21T07:00:05.828Z", "dateReserved": "2023-02-19T15:52:05.564Z", "dateUpdated": "2024-08-06T08:58:26.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-15011 (GCVE-0-2016-15011)
Vulnerability from cvelistv5
Published
2023-01-06 09:46
Modified
2024-08-06 03:47
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function checkSignResponse of the file dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 is able to address this issue. The identifier of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
e-Contract | dssp |
Version: 1.3.0 Version: 1.3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.217549" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.217549" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/e-Contract/dssp/commit/ec4238349691ec66dd30b416ec6eaab02d722302" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/e-Contract/dssp/releases/tag/dssp-1.3.2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dssp", "vendor": "e-Contract", "versions": [ { "status": "affected", "version": "1.3.0" }, { "status": "affected", "version": "1.3.1" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function checkSignResponse of the file dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 is able to address this issue. The identifier of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability." }, { "lang": "de", "value": "In e-Contract dssp bis 1.3.1 wurde eine problematische Schwachstelle entdeckt. Hierbei betrifft es die Funktion checkSignResponse der Datei dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. Mit der Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.3.2 vermag dieses Problem zu l\u00f6sen. Der Patch wird als ec4238349691ec66dd30b416ec6eaab02d722302 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.9, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T09:56:15.698Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.217549" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.217549" }, { "tags": [ "patch" ], "url": "https://github.com/e-Contract/dssp/commit/ec4238349691ec66dd30b416ec6eaab02d722302" }, { "tags": [ "patch" ], "url": "https://github.com/e-Contract/dssp/releases/tag/dssp-1.3.2" } ], "timeline": [ { "lang": "en", "time": "2023-01-06T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-01-06T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-01-06T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-01-29T09:57:26.000Z", "value": "VulDB entry last update" } ], "title": "e-Contract dssp SignResponseVerifier.java checkSignResponse xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2016-15011", "datePublished": "2023-01-06T09:46:20.281Z", "dateReserved": "2023-01-06T09:44:53.849Z", "dateUpdated": "2024-08-06T03:47:34.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-15026 (GCVE-0-2016-15026)
Vulnerability from cvelistv5
Published
2023-02-20 11:00
Modified
2024-08-06 03:47
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The patch is identified as 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.221486" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.221486" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://github.com/3breadt/dd-plist/pull/26" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/3breadt/dd-plist/commit/8c954e8d9f6f6863729e50105a8abf3f87fff74c" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/3breadt/dd-plist/releases/tag/dd-plist-1.18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dd-plist", "vendor": "3breadt", "versions": [ { "status": "affected", "version": "1.17" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The patch is identified as 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability." }, { "lang": "de", "value": "Eine Schwachstelle wurde in 3breadt dd-plist 1.17 gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion. Dank Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Ein Aktualisieren auf die Version 1.18 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 8c954e8d9f6f6863729e50105a8abf3f87fff74c bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T11:17:59.087Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.221486" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.221486" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/3breadt/dd-plist/pull/26" }, { "tags": [ "patch" ], "url": "https://github.com/3breadt/dd-plist/commit/8c954e8d9f6f6863729e50105a8abf3f87fff74c" }, { "tags": [ "patch" ], "url": "https://github.com/3breadt/dd-plist/releases/tag/dd-plist-1.18" } ], "timeline": [ { "lang": "en", "time": "2023-02-18T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-02-18T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-02-18T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-03-23T09:24:31.000Z", "value": "VulDB entry last update" } ], "title": "3breadt dd-plist xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2016-15026", "datePublished": "2023-02-20T11:00:05.072Z", "dateReserved": "2023-02-18T19:58:28.204Z", "dateUpdated": "2024-08-06T03:47:34.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9487 (GCVE-0-2016-9487)
Vulnerability from cvelistv5
Published
2018-07-13 20:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim's trust relationship with other entities.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:38.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#779243", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/779243" }, { "name": "94864", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/94864/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EpubCheck", "vendor": "EpubCheck", "versions": [ { "status": "affected", "version": "4.0.1" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Craig Arendt for reporting this vulnerability." } ], "datePublic": "2016-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim\u0027s trust relationship with other entities." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-13T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#779243", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/779243" }, { "name": "94864", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/94864/" } ], "solutions": [ { "lang": "en", "value": "EpubCheck has released version 4.0.2 to address the vulnerability." } ], "source": { "discovery": "UNKNOWN" }, "title": "EpubCheck 4.0.1 is vulnerable to external XML entity processing attacks", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-9487", "STATE": "PUBLIC", "TITLE": "EpubCheck 4.0.1 is vulnerable to external XML entity processing attacks" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EpubCheck", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_name": "4.0.1", "version_value": "4.0.1" } ] } } ] }, "vendor_name": "EpubCheck" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Craig Arendt for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim\u0027s trust relationship with other entities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611" } ] } ] }, "references": { "reference_data": [ { "name": "VU#779243", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/779243" }, { "name": "94864", "refsource": "BID", "url": "https://www.securityfocus.com/bid/94864/" } ] }, "solution": [ { "lang": "en", "value": "EpubCheck has released version 4.0.2 to address the vulnerability." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-9487", "datePublished": "2018-07-13T20:00:00", "dateReserved": "2016-11-21T00:00:00", "dateUpdated": "2024-08-06T02:50:38.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9491 (GCVE-0-2016-9491)
Vulnerability from cvelistv5
Published
2018-07-13 20:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager configuration, stored private keys, etc. By default Application Manager is running with administrative privileges, therefore it is possible to access every directory on the underlying operating system.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | Applications Manager |
Version: 12 Version: 13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:38.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/97394/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9491.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Applications Manager", "vendor": "ManageEngine", "versions": [ { "status": "affected", "version": "12" }, { "status": "affected", "version": "13" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Lukasz Juszczyk for reporting this vulnerability." } ], "datePublic": "2017-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager configuration, stored private keys, etc. By default Application Manager is running with administrative privileges, therefore it is possible to access every directory on the underlying operating system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-06T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/97394/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9491.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "ManageEngine Applications Manager 12 and 13 is vulnerable to privilege escalation due to improper restriction of an XML external entity ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-9491", "STATE": "PUBLIC", "TITLE": "ManageEngine Applications Manager 12 and 13 is vulnerable to privilege escalation due to improper restriction of an XML external entity " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Applications Manager", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_name": "12", "version_value": "12" }, { "affected": "=", "version_affected": "=", "version_name": "13", "version_value": "13" } ] } } ] }, "vendor_name": "ManageEngine" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Lukasz Juszczyk for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager configuration, stored private keys, etc. By default Application Manager is running with administrative privileges, therefore it is possible to access every directory on the underlying operating system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611" } ] } ] }, "references": { "reference_data": [ { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "refsource": "BID", "url": "https://www.securityfocus.com/bid/97394/" }, { "name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9491.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9491.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-9491", "datePublished": "2018-07-13T20:00:00", "dateReserved": "2016-11-21T00:00:00", "dateUpdated": "2024-08-06T02:50:38.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-20151 (GCVE-0-2017-20151)
Vulnerability from cvelistv5
Published
2022-12-30 11:35
Modified
2024-08-05 21:45
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - XML External Entity Reference
Summary
A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The patch is identified as ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:25.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.217054" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.217054" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/itext/rups/commit/ac5590925874ef810018a6b60fec216eee54fb32" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "RUPS", "vendor": "iText", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The patch is identified as ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability." }, { "lang": "de", "value": "In iText RUPS wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei src/main/java/com/itextpdf/rups/model/XfaFile.java. Mit der Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Patch wird als ac5590925874ef810018a6b60fec216eee54fb32 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.2, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T11:28:57.812Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.217054" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.217054" }, { "tags": [ "patch" ], "url": "https://github.com/itext/rups/commit/ac5590925874ef810018a6b60fec216eee54fb32" } ], "timeline": [ { "lang": "en", "time": "2022-12-30T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2022-12-30T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2022-12-30T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-01-26T09:10:54.000Z", "value": "VulDB entry last update" } ], "title": "iText RUPS XfaFile.java xml external entity reference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20151", "datePublished": "2022-12-30T11:35:05.336Z", "dateReserved": "2022-12-30T11:33:55.046Z", "dateUpdated": "2024-08-05T21:45:25.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-3206 (GCVE-0-2017-3206)
Vulnerability from cvelistv5
Published
2018-06-11 17:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Summary
The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Exadel | Flamingo amf-serializer |
Version: 2.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://codewhitesec.blogspot.com/2017/04/amf.html" }, { "name": "VU#307983", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/307983" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution" }, { "name": "97380", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Flamingo amf-serializer", "vendor": "Exadel", "versions": [ { "status": "affected", "version": "2.2.0" } ] } ], "datePublic": "2017-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-12T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://codewhitesec.blogspot.com/2017/04/amf.html" }, { "name": "VU#307983", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/307983" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution" }, { "name": "97380", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97380" } ], "source": { "discovery": "UNKNOWN" }, "title": "The Action Message Format (AMF3) deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-3206", "STATE": "PUBLIC", "TITLE": "The Action Message Format (AMF3) deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Flamingo amf-serializer", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_name": "2.2.0", "version_value": "2.2.0" } ] } } ] }, "vendor_name": "Exadel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://codewhitesec.blogspot.com/2017/04/amf.html", "refsource": "MISC", "url": "https://codewhitesec.blogspot.com/2017/04/amf.html" }, { "name": "VU#307983", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/307983" }, { "name": "http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution", "refsource": "MISC", "url": "http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution" }, { "name": "97380", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97380" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-3206", "datePublished": "2018-06-11T17:00:00", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-08-05T14:16:28.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases: Implementation, System Configuration
Description:
- Many XML parsers and validators can be configured to disable external entity expansion.
CAPEC-221: Data Serialization External Entities Blowup
This attack takes advantage of the entity replacement property of certain data serialization languages (e.g., XML, YAML, etc.) where the value of the replacement is a URI. A well-crafted file could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.