CWE-827
Improper Control of Document Type Definition
The product does not restrict a reference to a Document Type Definition (DTD) to the intended control sphere. This might allow attackers to reference arbitrary DTDs, possibly causing the product to expose files, consume excessive system resources, or execute arbitrary http requests on behalf of the attacker.
CVE-2024-9044 (GCVE-0-2024-9044)
Vulnerability from cvelistv5
Published
2024-11-29 07:40
Modified
2024-11-29 13:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A XML External Entity (XXE) vulnerability has been identified in Easy Tax Client Software 2023 1.2 and earlier across multiple platforms, including Windows, Linux, and macOS.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
msg Suisse AG | EasyTax |
Version: 2023 ≤ 1.2 Version: 2022 ≤ 1.3 Version: <= 2021 ≤ * |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T13:43:27.733877Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T13:43:41.079Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux" ], "product": "EasyTax", "vendor": "msg Suisse AG", "versions": [ { "lessThanOrEqual": "1.2", "status": "affected", "version": "2023", "versionType": "semver" }, { "lessThanOrEqual": "1.3", "status": "affected", "version": "2022", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "affected", "version": "\u003c= 2021", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Manuel Kiesel (cyllective AG)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A XML External Entity (XXE) vulnerability has been identified in Easy Tax Client Software 2023 1.2 and earlier across multiple platforms, including Windows, Linux, and macOS.\u003cp\u003e\u003c/p\u003e" } ], "value": "A XML External Entity (XXE) vulnerability has been identified in Easy Tax Client Software 2023 1.2 and earlier across multiple platforms, including Windows, Linux, and macOS." } ], "impacts": [ { "capecId": "CAPEC-228", "descriptions": [ { "lang": "en", "value": "CAPEC-228 DTD Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 4.6, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:L/SI:N/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-827", "description": "CWE-827 Improper Control of Document Type Definition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-29T07:40:08.009Z", "orgId": "455daabc-a392-441d-aa46-37d35189897c", "shortName": "NCSC.ch" }, "references": [ { "url": "https://www.ag.ch/de/verwaltung/dfr/steuern/natuerliche-personen/steuererklaerung-easytax" } ], "source": { "discovery": "UNKNOWN" }, "title": "XML External Entity (XXE) Vulnerability in EasyTax", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c", "assignerShortName": "NCSC.ch", "cveId": "CVE-2024-9044", "datePublished": "2024-11-29T07:40:08.009Z", "dateReserved": "2024-09-20T12:34:24.469Z", "dateUpdated": "2024-11-29T13:43:41.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4949 (GCVE-0-2025-4949)
Vulnerability from cvelistv5
Published
2025-05-21 06:47
Modified
2025-05-23 07:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In Eclipse JGit versions 7.2.0.202503040940-r and older, the ManifestParser class used by the repo command and the AmazonS3 class used to implement the experimental amazons3 git transport protocol allowing to store git pack files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing XML files. This vulnerability can lead to information disclosure, denial of service, and other security issues.
References
► | URL | Tags |
---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Eclipse JGit | Eclipse JGit |
Version: 7.2.0 Version: 7.1.0 Version: 7.0.0 Version: 0 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4949", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T10:22:48.944398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-21T10:24:58.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://projects.eclipse.org", "defaultStatus": "unaffected", "product": "Eclipse JGit", "repo": "https://github.com/eclipse-jgit/jgit", "vendor": "Eclipse JGit", "versions": [ { "lessThan": "7.2.1.202505142326-r", "status": "affected", "version": "7.2.0", "versionType": "osgi" }, { "lessThan": "7.1.1.202505221757-r", "status": "affected", "version": "7.1.0", "versionType": "osgi" }, { "lessThan": "7.0.1.202505221510-r", "status": "affected", "version": "7.0.0", "versionType": "osgi" }, { "lessThan": "6.10.1.202505221210-r", "status": "affected", "version": "0", "versionType": "osgi" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "pkg:maven/org.eclipse.jgit/org.eclipse.jgit", "product": "Eclipse JGit", "repo": "https://github.com/eclipse-jgit/jgit", "vendor": "Eclipse JGit", "versions": [ { "lessThan": "7.2.1.202505142326-r", "status": "affected", "version": "7.2.0", "versionType": "osgi" }, { "lessThan": "7.1.1.202505221757-r", "status": "affected", "version": "7.1.0", "versionType": "osgi" }, { "lessThan": "7.0.1.202505221510-r", "status": "affected", "version": "7.0.0", "versionType": "osgi" }, { "lessThan": "6.10.1.202505221210-r", "status": "affected", "version": "0", "versionType": "osgi" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Simon Gerst (intrigus-lgtm) https://intrigus.org" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Eclipse JGit versions 7.2.0.202503040940-r and older, the \u003ccode\u003eManifestParser\u003c/code\u003e class used by the \u003ccode\u003erepo\u003c/code\u003e command and the \u003ccode\u003eAmazonS3\u003c/code\u003e class used to implement the experimental \u003ccode\u003eamazons3\u003c/code\u003e git transport protocol allowing to store git pack files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing XML files. This vulnerability can lead to information disclosure, denial of service, and other security issues." } ], "value": "In Eclipse JGit versions 7.2.0.202503040940-r and older, the ManifestParser class used by the repo command and the AmazonS3 class used to implement the experimental amazons3 git transport protocol allowing to store git pack files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing XML files. This vulnerability can lead to information disclosure, denial of service, and other security issues." } ], "impacts": [ { "capecId": "CAPEC-201", "descriptions": [ { "lang": "en", "value": "CAPEC-201 Serialized Data External Linking" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "NEGLIGIBLE", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "GREEN", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/S:N/AU:Y/R:U/V:D/RE:L/U:Green", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "LOW" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL." } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-827", "description": "CWE-827 Improper Control of Document Type Definition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-23T07:00:45.737Z", "orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "shortName": "eclipse" }, "references": [ { "tags": [ "release-notes" ], "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1" }, { "tags": [ "release-notes" ], "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.1.1" }, { "tags": [ "release-notes" ], "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.0.1" }, { "tags": [ "release-notes" ], "url": "https://projects.eclipse.org/projects/technology.jgit/releases/6.10.1" }, { "tags": [ "issue-tracking" ], "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281" }, { "tags": [ "issue-tracking" ], "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64" } ], "source": { "discovery": "EXTERNAL" }, "title": "XXE vulnerability in Eclipse JGit", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "assignerShortName": "eclipse", "cveId": "CVE-2025-4949", "datePublished": "2025-05-21T06:47:19.777Z", "dateReserved": "2025-05-19T07:02:22.381Z", "dateUpdated": "2025-05-23T07:00:45.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
No CAPEC attack patterns related to this CWE.