CWE-91
XML Injection (aka Blind XPath Injection)
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
CVE-2019-17323 (GCVE-0-2019-17323)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection)
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:40:14.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35184" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "REXPERT", "vendor": "ClipSoft", "versions": [ { "status": "affected", "version": "1.0.0.527 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation and execution via report print function of rexpert viewer with modified XML document. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91: XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-30T20:49:41", "orgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "shortName": "krcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35184" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2019-17323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "REXPERT", "version": { "version_data": [ { "version_value": "1.0.0.527 and earlier" } ] } } ] }, "vendor_name": "ClipSoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation and execution via report print function of rexpert viewer with modified XML document. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-91: XML Injection (aka Blind XPath Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35184", "refsource": "MISC", "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35184" } ] } } } }, "cveMetadata": { "assignerOrgId": "cdd7a122-0fae-4202-8d86-14efbacc2863", "assignerShortName": "krcert", "cveId": "CVE-2019-17323", "datePublished": "2019-10-30T20:49:41", "dateReserved": "2019-10-07T00:00:00", "dateUpdated": "2024-08-05T01:40:14.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8479 (GCVE-0-2020-8479)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection)
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "ABB Ability\u2122 SCADAvantage", "vendor": "ABB", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThanOrEqual": "5.6.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5. an XML External Entity Injection vulnerability exists that allows an attacker to read or call arbitrary files from the license server and/or from the network and also block the license handling." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91 XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - XML External Entity Injection", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8479", "datePublished": "2020-04-29T00:00:00", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21019 (GCVE-0-2021-21019)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection) ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Magento Commerce |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Magento Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-p1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the Widgets module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "XML Injection (aka Blind XPath Injection) (CWE-91)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-11T19:29:31", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Magento Commerce XML Injection Could Lead To Remote Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2021-02-09T23:00:00.000Z", "ID": "CVE-2021-21019", "STATE": "PUBLIC", "TITLE": "Magento Commerce XML Injection Could Lead To Remote Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Magento Commerce", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.1" }, { "version_affected": "\u003c=", "version_value": "2.4.0-p1" }, { "version_affected": "\u003c=", "version_value": "2.3.6" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the Widgets module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation." } ] }, "impact": { "cvss": { "attackComplexity": "None", "attackVector": "None", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "integrityImpact": "None", "privilegesRequired": "None", "scope": "None", "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML Injection (aka Blind XPath Injection) (CWE-91)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/magento/apsb21-08.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2021-21019", "datePublished": "2021-02-11T19:29:31.885358Z", "dateReserved": "2020-12-18T00:00:00", "dateUpdated": "2024-09-17T02:16:25.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21025 (GCVE-0-2021-21025)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection) ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Magento Commerce |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:01:13.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Magento Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.4.0-p1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the product layout updates. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "XML Injection (aka Blind XPath Injection) (CWE-91)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-11T19:29:32", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Magento Commerce XML Injection Could Lead To Arbitrary Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2021-02-09T23:00:00.000Z", "ID": "CVE-2021-21025", "STATE": "PUBLIC", "TITLE": "Magento Commerce XML Injection Could Lead To Arbitrary Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Magento Commerce", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.1" }, { "version_affected": "\u003c=", "version_value": "2.4.0-p1" }, { "version_affected": "\u003c=", "version_value": "2.3.6" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the product layout updates. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation." } ] }, "impact": { "cvss": { "attackComplexity": "None", "attackVector": "None", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "integrityImpact": "None", "privilegesRequired": "None", "scope": "None", "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML Injection (aka Blind XPath Injection) (CWE-91)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/magento/apsb21-08.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb21-08.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2021-21025", "datePublished": "2021-02-11T19:29:32.393015Z", "dateReserved": "2020-12-18T00:00:00", "dateUpdated": "2024-09-16T18:44:45.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22524 (GCVE-0-2021-22524)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection)
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Micro Focus | NetIQ Access Manager |
Version: NetIQ Access Manager < 5.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager501-release-notes/accessmanager501-release-notes.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.microfocus.com/kb/doc.php?id=7025256" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "All" ], "product": "NetIQ Access Manager", "vendor": "Micro Focus", "versions": [ { "changes": [ { "at": "4.5.4", "status": "unaffected" } ], "lessThan": "5.0.1", "status": "affected", "version": "NetIQ Access Manager", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Sipke Mellema for responsibly disclosing this vulnerability" } ], "datePublic": "2021-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Injection attack caused the denial of service vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91 XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-13T11:58:31", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager501-release-notes/accessmanager501-release-notes.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.microfocus.com/kb/doc.php?id=7025256" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial of service vulnerability in NetIQ Access Manager versions prior to version 4.5.4 and 5.0.1", "workarounds": [ { "lang": "en", "value": "Install / Upgrade NetIQ Access Manager 5.0.1 or 4.5.4" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2021-08-31T00:00:00.000Z", "ID": "CVE-2021-22524", "STATE": "PUBLIC", "TITLE": "Denial of service vulnerability in NetIQ Access Manager versions prior to version 4.5.4 and 5.0.1" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NetIQ Access Manager", "version": { "version_data": [ { "platform": "All", "version_affected": "\u003c", "version_name": "NetIQ Access Manager", "version_value": "5.0.1" }, { "platform": "All", "version_affected": "\u003c", "version_name": "NetIQ Access Manager", "version_value": "4.5.4" } ] } } ] }, "vendor_name": "Micro Focus" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Sipke Mellema for responsibly disclosing this vulnerability" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Injection attack caused the denial of service vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-91 XML Injection (aka Blind XPath Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager501-release-notes/accessmanager501-release-notes.html", "refsource": "CONFIRM", "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager501-release-notes/accessmanager501-release-notes.html" }, { "name": "https://support.microfocus.com/kb/doc.php?id=7025256", "refsource": "CONFIRM", "url": "https://support.microfocus.com/kb/doc.php?id=7025256" } ] }, "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Install / Upgrade NetIQ Access Manager 5.0.1 or 4.5.4" } ] } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2021-22524", "datePublished": "2021-09-13T11:58:31.576666Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T01:35:57.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27777 (GCVE-0-2021-27777)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection)
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
HCL Software | HCL Unica |
Version: 12 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:10.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097124" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HCL Unica", "vendor": "HCL Software", "versions": [ { "status": "affected", "version": "12 and below" } ] } ], "datePublic": "2022-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "XML External Entity (XXE) injection vulnerabilities occur when poorly configured XML parsers process user supplied input without sufficient validation. Attackers can exploit this vulnerability to manipulate XML content and inject malicious external entity references." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91 XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-25T16:50:10", "orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc", "shortName": "HCL" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097124" } ], "source": { "discovery": "UNKNOWN" }, "title": "HCL Unica Platform is vulnerable to XML External Entity (XXE) injection", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@hcl.com", "DATE_PUBLIC": "2022-04-10T00:00:00.000Z", "ID": "CVE-2021-27777", "STATE": "PUBLIC", "TITLE": "HCL Unica Platform is vulnerable to XML External Entity (XXE) injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HCL Unica", "version": { "version_data": [ { "version_value": "12 and below" } ] } } ] }, "vendor_name": "HCL Software" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XML External Entity (XXE) injection vulnerabilities occur when poorly configured XML parsers process user supplied input without sufficient validation. Attackers can exploit this vulnerability to manipulate XML content and inject malicious external entity references." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-91 XML Injection (aka Blind XPath Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097124", "refsource": "MISC", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097124" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc", "assignerShortName": "HCL", "cveId": "CVE-2021-27777", "datePublished": "2022-05-12T21:25:31.294598Z", "dateReserved": "2021-02-26T00:00:00", "dateUpdated": "2024-09-16T19:31:23.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-32758 (GCVE-0-2021-32758)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection)
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.15 Version: >= 20, < 20.0.11 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.15" }, { "status": "affected", "version": "\u003e= 20, \u003c 20.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91: XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-27T17:30:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ], "source": { "advisory": "GHSA-26rr-v2j2-25fh", "discovery": "UNKNOWN" }, "title": "Layout XML Arbitrary Code Fix ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32758", "STATE": "PUBLIC", "TITLE": "Layout XML Arbitrary Code Fix " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.15" }, { "version_value": "\u003e= 20, \u003c 20.0.11" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-91: XML Injection (aka Blind XPath Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ] }, "source": { "advisory": "GHSA-26rr-v2j2-25fh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32758", "datePublished": "2021-08-27T17:30:10", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-36020 (GCVE-0-2021-36020)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection) ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Magento Commerce |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Magento Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-p1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the \u0027City\u0027 field. An unauthenticated attacker can trigger a specially crafted script to achieve remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "XML Injection (aka Blind XPath Injection) (CWE-91)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-01T14:30:56", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Magento Commerce XML Injection Vulnerability In The \u0027City\u0027 Field Could Lead To Remote Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2021-08-10T23:00:00.000Z", "ID": "CVE-2021-36020", "STATE": "PUBLIC", "TITLE": "Magento Commerce XML Injection Vulnerability In The \u0027City\u0027 Field Could Lead To Remote Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Magento Commerce", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.2" }, { "version_affected": "\u003c=", "version_value": "2.4.2-p1" }, { "version_affected": "\u003c=", "version_value": "2.3.7" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the \u0027City\u0027 field. An unauthenticated attacker can trigger a specially crafted script to achieve remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "None", "baseScore": 8.2, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML Injection (aka Blind XPath Injection) (CWE-91)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/magento/apsb21-64.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2021-36020", "datePublished": "2021-09-01T14:30:56.497937Z", "dateReserved": "2021-06-30T00:00:00", "dateUpdated": "2024-09-16T23:31:49.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-36028 (GCVE-0-2021-36028)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection) ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Magento Commerce |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Magento Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-p1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability when saving a configurable product. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "XML Injection (aka Blind XPath Injection) (CWE-91)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-01T14:28:56", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Magento Commerce XML Injection Vulnerability Could Lead To Remote Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2021-08-10T23:00:00.000Z", "ID": "CVE-2021-36028", "STATE": "PUBLIC", "TITLE": "Magento Commerce XML Injection Vulnerability Could Lead To Remote Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Magento Commerce", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.2" }, { "version_affected": "\u003c=", "version_value": "2.4.2-p1" }, { "version_affected": "\u003c=", "version_value": "2.3.7" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability when saving a configurable product. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "High", "scope": "Changed", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML Injection (aka Blind XPath Injection) (CWE-91)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/magento/apsb21-64.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2021-36028", "datePublished": "2021-09-01T14:28:56.481294Z", "dateReserved": "2021-06-30T00:00:00", "dateUpdated": "2024-09-16T23:20:58.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-36033 (GCVE-0-2021-36033)
Vulnerability from cvelistv5
- CWE-91 - XML Injection (aka Blind XPath Injection) ()
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Magento Commerce |
Version: unspecified < Version: unspecified < Version: unspecified < Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Magento Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.4.2-p1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.3.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the Widgets Module. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "XML Injection (aka Blind XPath Injection) (CWE-91)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-01T14:28:30", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Magento Commerce Widgets Module XML Injection Vulnerability Could Lead To Remote Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2021-08-10T23:00:00.000Z", "ID": "CVE-2021-36033", "STATE": "PUBLIC", "TITLE": "Magento Commerce Widgets Module XML Injection Vulnerability Could Lead To Remote Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Magento Commerce", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.2" }, { "version_affected": "\u003c=", "version_value": "2.4.2-p1" }, { "version_affected": "\u003c=", "version_value": "2.3.7" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the Widgets Module. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Network", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "High", "scope": "Changed", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML Injection (aka Blind XPath Injection) (CWE-91)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/magento/apsb21-64.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2021-36033", "datePublished": "2021-09-01T14:28:30.908518Z", "dateReserved": "2021-06-30T00:00:00", "dateUpdated": "2024-09-16T23:21:27.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-5
Phase: Implementation
Strategy: Input Validation
Description:
- Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
- When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
- Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
CAPEC-250: XML Injection
An attacker utilizes crafted XML user-controllable input to probe, attack, and inject data into the XML database, using techniques similar to SQL injection. The user-controllable input can allow for unauthorized viewing of data, bypassing authentication or the front-end application for direct XML database access, and possibly altering database information.
CAPEC-83: XPath Injection
An attacker can craft special user-controllable input consisting of XPath expressions to inject the XML database and bypass authentication or glean information that they normally would not be able to. XPath Injection enables an attacker to talk directly to the XML database, thus bypassing the application completely. XPath Injection results from the failure of an application to properly sanitize input used as part of dynamic XPath expressions used to query an XML database.