Vulnerabilites related to apache - poi
CVE-2025-31672 (GCVE-0-2025-31672)
Vulnerability from cvelistv5
Published
2025-04-09 11:59
Modified
2025-05-23 13:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.
This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.
Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache POI |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-05-23T13:11:07.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/04/08/2" }, { "url": "https://security.netapp.com/advisory/ntap-20250523-0004/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-31672", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T17:06:29.220111Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-18T17:06:47.782Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "org.apache.poi:poi-ooxml", "product": "Apache POI", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "5.4.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.\u003cbr\u003eThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.\u003cbr\u003eUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://poi.apache.org/security.html\"\u003ehttps://poi.apache.org/security.html\u003c/a\u003e for recommendations about how to use the POI libraries securely." } ], "value": "Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.\nThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.\nUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely." } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T11:59:33.900Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=69620" }, { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5" } ], "source": { "defect": [ "bug-69620" ], "discovery": "INTERNAL" }, "title": "Apache POI: parsing OOXML based files (xlsx, docx, etc.), poi-ooxml could read unexpected data if underlying zip has duplicate zip entry names", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-31672", "datePublished": "2025-04-09T11:59:33.900Z", "dateReserved": "2025-03-31T21:16:14.017Z", "dateUpdated": "2025-05-23T13:11:07.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3574 (GCVE-0-2014-3574)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69648" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61766" }, { "name": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "refsource": "CONFIRM", "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "name": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3574", "datePublished": "2014-09-04T17:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-26336 (GCVE-0-2022-26336)
Vulnerability from cvelistv5
Published
2022-03-04 00:00
Modified
2024-08-03 05:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | poi-scratchpad |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "poi-scratchpad", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "5.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache POI would like to thank Craig Haft of Yahoo Inc. for reporting and providing a patch for this issue." } ], "descriptions": [ { "lang": "en", "value": "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "source": { "defect": [ "https://bz.apache.org/bugzilla/show_bug.cgi?id=65899" ], "discovery": "UNKNOWN" }, "title": "A carefully crafted TNEF file can cause an out of memory exception", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-26336", "datePublished": "2022-03-04T00:00:00", "dateReserved": "2022-03-01T00:00:00", "dateUpdated": "2024-08-03T05:03:32.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12626 (GCVE-0-2017-12626)
Vulnerability from cvelistv5
Published
2018-01-29 17:00
Modified
2024-09-16 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerabilities
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache POI |
Version: < 3.17 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1322", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "name": "102879", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "\u003c 3.17" } ] } ], "datePublic": "2018-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-14T17:20:03", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "RHSA-2018:1322", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "name": "102879", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2018-01-26T00:00:00", "ID": "CVE-2017-12626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "\u003c 3.17" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1322", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E" }, { "name": "102879", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12626", "datePublished": "2018-01-29T17:00:00Z", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-09-16T18:45:21.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-5644 (GCVE-0-2017-5644)
Vulnerability from cvelistv5
Published
2017-03-24 14:00
Modified
2024-08-05 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- XXE
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache POI |
Version: before 3.15 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:47.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96983", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96983" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "before 3.15" } ] } ], "datePublic": "2017-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "XXE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "96983", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96983" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5644", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "before 3.15" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XXE" } ] } ] }, "references": { "reference_data": [ { "name": "96983", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96983" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", "refsource": "CONFIRM", "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5644", "datePublished": "2017-03-24T14:00:00", "dateReserved": "2017-01-29T00:00:00", "dateUpdated": "2024-08-05T15:11:47.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0213 (GCVE-0-2012-0213)
Vulnerability from cvelistv5
Published
2012-08-07 21:00
Modified
2024-08-06 18:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:19.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-10T21:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2012-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49040" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", "refsource": "CONFIRM", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=799078", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2012-0213", "datePublished": "2012-08-07T21:00:00", "dateReserved": "2011-12-14T00:00:00", "dateUpdated": "2024-08-06T18:16:19.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-9527 (GCVE-0-2014-9527)
Vulnerability from cvelistv5
Published
2015-01-06 15:00
Modified
2024-08-06 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-10T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", "refsource": "CONFIRM", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9527", "datePublished": "2015-01-06T15:00:00", "dateReserved": "2015-01-06T00:00:00", "dateUpdated": "2024-08-06T13:47:41.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5000 (GCVE-0-2016-5000)
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:40.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "refsource": "MLIST", "url": "https://lists.apache.org/list.html?user@poi.apache.org" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5000", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-05-24T00:00:00", "dateUpdated": "2024-08-06T00:46:40.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3529 (GCVE-0-2014-3529)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:16.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3529", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61766" }, { "name": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "refsource": "CONFIRM", "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "name": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3529", "datePublished": "2014-09-04T17:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:16.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12415 (GCVE-0-2019-12415)
Vulnerability from cvelistv5
Published
2019-10-23 19:27
Modified
2024-08-04 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache POI |
Version: Apache POI up to 4.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:40.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache POI up to 4.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T10:38:23", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-12415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "Apache POI up to 4.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-12415", "datePublished": "2019-10-23T19:27:20", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:40.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-10-23 20:15
Modified
2024-11-21 04:22
Severity ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E | ||
security@apache.org | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpujan2020.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpujan2021.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpuoct2020.html | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpuoct2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuApr2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2021.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
oracle | application_testing_suite | 12.5.0.3 | |
oracle | application_testing_suite | 13.1.0.1 | |
oracle | application_testing_suite | 13.2.0.1 | |
oracle | application_testing_suite | 13.3.0.1 | |
oracle | banking_enterprise_originations | 2.7.0 | |
oracle | banking_enterprise_originations | 2.8.0 | |
oracle | banking_enterprise_product_manufacturing | 2.7.0 | |
oracle | banking_enterprise_product_manufacturing | 2.8.0 | |
oracle | banking_payments | 14.0.0 | |
oracle | banking_payments | 14.1.0 | |
oracle | banking_platform | 2.4.0 | |
oracle | banking_platform | 2.4.1 | |
oracle | banking_platform | 2.5.0 | |
oracle | banking_platform | 2.6.0 | |
oracle | banking_platform | 2.6.1 | |
oracle | banking_platform | 2.6.2 | |
oracle | banking_platform | 2.7.0 | |
oracle | banking_platform | 2.7.1 | |
oracle | banking_platform | 2.9.0 | |
oracle | big_data_discovery | 1.6 | |
oracle | communications_diameter_signaling_router_idih\ | ||
oracle | communications_diameter_signaling_router_idih\ | ||
oracle | endeca_information_discovery_studio | 3.2.0 | |
oracle | enterprise_manager_base_platform | 12.1.0.5 | |
oracle | enterprise_manager_base_platform | 13.3.0.0 | |
oracle | enterprise_manager_base_platform | 13.4.0.0 | |
oracle | enterprise_repository | 12.1.3.0.0 | |
oracle | financial_services_analytical_applications_infrastructure | * | |
oracle | financial_services_market_risk_measurement_and_management | 8.0.6 | |
oracle | financial_services_market_risk_measurement_and_management | 8.0.8 | |
oracle | flexcube_private_banking | 12.0.0 | |
oracle | flexcube_private_banking | 12.1.0 | |
oracle | hyperion_infrastructure_technology | 11.1.2.4 | |
oracle | instantis_enterprisetrack | 17.1 | |
oracle | instantis_enterprisetrack | 17.2 | |
oracle | instantis_enterprisetrack | 17.3 | |
oracle | insurance_policy_administration_j2ee | 11.0.2 | |
oracle | insurance_policy_administration_j2ee | 11.1.0 | |
oracle | insurance_policy_administration_j2ee | 11.2.0 | |
oracle | insurance_rules_palette | 10.2.0 | |
oracle | insurance_rules_palette | 10.2.4 | |
oracle | insurance_rules_palette | 11.0.2 | |
oracle | insurance_rules_palette | 11.1.0 | |
oracle | insurance_rules_palette | 11.2.0 | |
oracle | jdeveloper | 12.2.1.4.0 | |
oracle | peoplesoft_enterprise_peopletools | 8.57 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
oracle | peoplesoft_enterprise_peopletools | 8.59 | |
oracle | primavera_gateway | 17.12.6 | |
oracle | primavera_gateway | 18.8.8.1 | |
oracle | primavera_unifier | * | |
oracle | primavera_unifier | 16.1 | |
oracle | primavera_unifier | 16.2 | |
oracle | primavera_unifier | 18.8 | |
oracle | primavera_unifier | 19.12 | |
oracle | retail_clearance_optimization_engine | 14.0 | |
oracle | retail_order_broker | 15.0 | |
oracle | retail_order_broker | 16.0 | |
oracle | retail_predictive_application_server | 15.0.3 | |
oracle | retail_predictive_application_server | 16.0.3 | |
oracle | webcenter_portal | 12.2.1.3.0 | |
oracle | webcenter_portal | 12.2.1.4.0 | |
oracle | webcenter_sites | 12.2.1.3.0 | |
oracle | webcenter_sites | 12.2.1.4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D82A205-F4BE-4C18-A764-A2364B50BAD9", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "17EA8B91-7634-4636-B647-1049BA7CA088", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B4DF46F-DBCC-41F2-A260-F83A14838F23", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10F17843-32EA-4C31-B65C-F424447BEF7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AB8ABFD-C72C-4CBB-8872-9440A19154D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3054FEBB-484B-4927-9D1C-2024772E8B3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AED3C78-7D65-4F02-820D-B51BCE4022F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "557A23A1-4762-4D29-A478-D1670C1847D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7BE6EB99-98BF-49A2-8890-829320607A1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD48BA85-B6D3-4BFD-9B48-755494FF094E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2BEE49E-A5AA-42D3-B422-460454505480", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "35AD0C07-9688-4397-8D45-FBB88C0F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8972497F-6E24-45A9-9A18-EB0E842CB1D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "400509A8-D6F2-432C-A2F1-AD5B8778D0D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "132CE62A-FBFC-4001-81EC-35D81F73AF48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "282150FF-C945-4A3E-8A80-E8757A8907EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB9FC9AB-1070-420F-870E-A5EC43A924A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C4C38FF-B75B-4DF1-BFB3-C91BDD10D90E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDA4C6-68BA-4090-9645-A1A3C526F86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "00F3F284-E638-495D-89D0-AEB0CCA969CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D03A8C9-35A5-4B75-9711-7A4A60457307", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "36E39918-B2D6-43F0-A607-8FD8BFF6F340", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9E13DD9-F456-4802-84AD-A2A1F12FE999", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F940AA-05BE-426C-89A3-4098E107D9A7", "versionEndIncluding": "8.0.9", "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D5112-4055-4F89-A5B3-0DCB109481B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D262848E-AA24-4057-A747-6221BA22ADF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6762F207-93C7-4363-B2F9-7A7C6F8AF993", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B74B912-152D-4F38-9FC1-741D6D0B27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "DED59B62-C9BF-4C0E-B351-3884E8441655", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", "matchCriteriaId": "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", "matchCriteriaId": "7F69B9A5-F21B-4904-9F27-95C0F7A628E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A570E5E-A3BC-4E19-BC44-C28D8BC9A537", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "991B23C1-83FA-40B1-AF0A-9A7B10A9EDA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D56B4193-4DB7-4BD9-85FF-8665601E6D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A94F93C-5828-4D78-9C48-20AC17E72B8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E25293-CB03-44CE-A8ED-04B3A0487A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E08D8FE6-2BB4-4FF6-8B42-2D47F6FBFDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "335AB6A7-3B1F-4FA8-AF08-7D64C16C4B04", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "2F5647E5-B051-41A6-B186-3584C725908B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A405B01-7DC5-41A0-9B61-C2DBE1C71A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndIncluding": "17.12", "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8109973-AE49-4E2C-B3A0-DDB18674C1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE8CF045-09BB-4069-BCEC-496D5AE3B780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "38E74E68-7F19-4EF3-AC00-3C249EAAA39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24A3C819-5151-4543-A5C6-998C9387C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FB98961-8C99-4490-A6B8-9A5158784F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4F71A-4269-40FC-8F61-1D1301F2B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A502118-5B2B-47AE-82EC-1999BD841103", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D551CAB1-4312-44AA-BDA8-A030817E153A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "174A6D2E-E42E-4C92-A194-C6A820CD7EF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." }, { "lang": "es", "value": "En Apache POI versiones hasta 4.1.0, cuando se utiliza la herramienta XSSFExportToXml para convertir documentos de Microsoft Excel proporcionados por el usuario, un documento especialmente dise\u00f1ado puede permitir a un atacante leer archivos del sistema de archivos local o de los recursos de la red interna por medio de un Procesamiento de Entidad Externa XML (XXE)." } ], "id": "CVE-2019-12415", "lastModified": "2024-11-21T04:22:47.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-23T20:15:12.707", "references": [ { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-09 12:15
Modified
2025-07-15 19:08
Severity ?
Summary
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.
This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.
Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://bz.apache.org/bugzilla/show_bug.cgi?id=69620 | Permissions Required | |
security@apache.org | https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/04/08/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250523-0004/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "76CA0695-D40A-4BED-9DE8-6CF8CE7C00C9", "versionEndExcluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.\nThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.\nUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely." }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache POI. El problema afecta al an\u00e1lisis de archivos con formato OOXML como xlsx, docx y pptx. Estos formatos de archivo son b\u00e1sicamente archivos zip y es posible que usuarios maliciosos agreguen entradas zip con nombres duplicados (incluida la ruta) al archivo zip. En este caso, los productos que lean el archivo afectado podr\u00edan leer datos diferentes, ya que se selecciona una de las entradas zip con el nombre duplicado en lugar de otra, pero otros productos podr\u00edan elegir una entrada zip diferente. Este problema afecta a Apache POI poi-ooxml anterior a la versi\u00f3n 5.4.0. poi-ooxml 5.4.0 tiene una comprobaci\u00f3n que genera una excepci\u00f3n si se encuentran entradas zip con nombres de archivo duplicados en el archivo de entrada. Se recomienda a los usuarios actualizar a la versi\u00f3n poi-ooxml 5.4.0, que soluciona el problema. Consulte https://poi.apache.org/security.html para obtener recomendaciones sobre c\u00f3mo usar las bibliotecas de POI de forma segura." } ], "id": "CVE-2025-31672", "lastModified": "2025-07-15T19:08:21.700", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-04-09T12:15:15.563", "references": [ { "source": "security@apache.org", "tags": [ "Permissions Required" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=69620" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2025/04/08/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250523-0004/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-29 17:29
Modified
2024-11-21 03:09
Severity ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.securityfocus.com/bid/102879 | Third Party Advisory, VDB Entry | |
security@apache.org | https://access.redhat.com/errata/RHSA-2018:1322 | Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | ||
security@apache.org | https://www.oracle.com/security-alerts/cpuApr2021.html | ||
security@apache.org | https://www.oracle.com/security-alerts/cpuapr2020.html | ||
security@apache.org | https://www.oracle.com/security-alerts/cpujan2020.html | ||
security@apache.org | https://www.oracle.com/security-alerts/cpujan2021.html | ||
security@apache.org | https://www.oracle.com/security-alerts/cpujul2020.html | ||
security@apache.org | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
security@apache.org | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102879 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1322 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuApr2021.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2021.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C04149C-A260-4129-93DE-EA5815189C17", "versionEndExcluding": "3.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." }, { "lang": "es", "value": "Apache POI, en versiones anteriores al release 3.17, es vulnerable a ataques de denegaci\u00f3n de servicio (DoS): 1) bucles infinitos al analizar WMF, EMF, MSG y macros manipuladas (POI bugs 61338 y 61294); y 2) excepciones fuera de memoria al analizar DOC, PPT y XLS manipulados(POI bugs 52372 y 61295)." } ], "id": "CVE-2017-12626", "lastModified": "2024-11-21T03:09:55.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-29T17:29:00.410", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102879" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-04 16:15
Modified
2024-11-21 06:53
Severity ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A853FEC8-0927-4637-A352-BB91914AFFCD", "versionEndExcluding": "5.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1." }, { "lang": "es", "value": "Un fallo en el paquete HMEF de poi-scratchpad (Apache POI) permite a un atacante causar una excepci\u00f3n de Falta de Memoria. Este paquete es usado para leer archivos TNEF (Microsoft Outlook y Microsoft Exchange Server). Si una aplicaci\u00f3n usa poi-scratchpad para analizar archivos TNEF y la aplicaci\u00f3n permite que usuarios no confiables los suministren, entonces un archivo cuidadosamente dise\u00f1ado puede causar una excepci\u00f3n de Falta de Memoria. Este problema afecta a versi\u00f3n 5.2.0 de poi-scratchpad y versiones anteriores. Es recomendado a usuarios actualizar a poi-scratchpad versi\u00f3n 5.2.1" } ], "id": "CVE-2022-26336", "lastModified": "2024-11-21T06:53:46.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-04T16:15:10.923", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-770" } ], "source": "security@apache.org", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://poi.apache.org/changes.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1370.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1398.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1399.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1400.html | ||
secalert@redhat.com | http://secunia.com/advisories/59943 | ||
secalert@redhat.com | http://secunia.com/advisories/60419 | ||
secalert@redhat.com | http://secunia.com/advisories/61766 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
secalert@redhat.com | http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/69648 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/95768 | ||
secalert@redhat.com | https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://poi.apache.org/changes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1370.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1398.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1399.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1400.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59943 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60419 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61766 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69648 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/95768 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
apache | poi | 0.1 | |
apache | poi | 0.2 | |
apache | poi | 0.3 | |
apache | poi | 0.4 | |
apache | poi | 0.5 | |
apache | poi | 0.6 | |
apache | poi | 0.7 | |
apache | poi | 0.10.0 | |
apache | poi | 0.11.0 | |
apache | poi | 0.12.0 | |
apache | poi | 0.13.0 | |
apache | poi | 0.14.0 | |
apache | poi | 1.0.0 | |
apache | poi | 1.0.1 | |
apache | poi | 1.0.2 | |
apache | poi | 1.1.0 | |
apache | poi | 1.2.0 | |
apache | poi | 1.5 | |
apache | poi | 1.5.1 | |
apache | poi | 1.7 | |
apache | poi | 1.8 | |
apache | poi | 1.10 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.5 | |
apache | poi | 2.5.1 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0.1 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.2 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.6 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.9 | |
apache | poi | 3.10 | |
apache | poi | 3.10 | |
apache | poi | 3.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", "versionEndIncluding": "3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1501370-BC00-4456-9A52-EE4E9899567A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", "matchCriteriaId": "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.11:beta1:*:*:*:*:*:*", "matchCriteriaId": "9F89551C-19B6-4731-AB01-831B5B9C8C27", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." }, { "lang": "es", "value": "Apache POI anterior a 3.10.1 y 3.11.x anterior a 3.11-beta2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU y ca\u00edda) a trav\u00e9s de un fichero OOXML manipulado, tambi\u00e9n conocido como un ataque de expansi\u00f3n de entidad XML (XEE)." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2014-3574", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-04T17:55:05.670", "references": [ { "source": "secalert@redhat.com", "url": "http://poi.apache.org/changes.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59943" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60419" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61766" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69648" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://poi.apache.org/changes.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1370.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1398.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1399.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1400.html | ||
secalert@redhat.com | http://secunia.com/advisories/59943 | ||
secalert@redhat.com | http://secunia.com/advisories/60419 | ||
secalert@redhat.com | http://secunia.com/advisories/61766 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
secalert@redhat.com | http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt | ||
secalert@redhat.com | http://www.securityfocus.com/bid/69647 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/78018 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/95770 | ||
secalert@redhat.com | https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://poi.apache.org/changes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1370.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1398.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1399.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1400.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59943 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60419 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61766 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69647 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/78018 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/95770 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
apache | poi | 0.1 | |
apache | poi | 0.2 | |
apache | poi | 0.3 | |
apache | poi | 0.4 | |
apache | poi | 0.5 | |
apache | poi | 0.6 | |
apache | poi | 0.7 | |
apache | poi | 0.10.0 | |
apache | poi | 0.11.0 | |
apache | poi | 0.12.0 | |
apache | poi | 0.13.0 | |
apache | poi | 0.14.0 | |
apache | poi | 1.0.0 | |
apache | poi | 1.0.1 | |
apache | poi | 1.0.2 | |
apache | poi | 1.1.0 | |
apache | poi | 1.2.0 | |
apache | poi | 1.5 | |
apache | poi | 1.5.1 | |
apache | poi | 1.7 | |
apache | poi | 1.8 | |
apache | poi | 1.10 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.5 | |
apache | poi | 2.5.1 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0.1 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.2 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.6 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.9 | |
apache | poi | 3.10 | |
apache | poi | 3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", "versionEndIncluding": "3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1501370-BC00-4456-9A52-EE4E9899567A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", "matchCriteriaId": "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." }, { "lang": "es", "value": "La configuraci\u00f3n de OPC SAX en Apache POI anterior a 3.10.1 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de un fichero OpenXML que contiene una declaraci\u00f3n de entidad externa XML en conjunto con una referencia de entidad, relacionado con un problema de entidad externa XML (XXE)." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2014-3529", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-04T17:55:05.623", "references": [ { "source": "secalert@redhat.com", "url": "http://poi.apache.org/changes.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59943" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60419" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61766" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69647" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/78018" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/78018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/538981/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/92100 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1037741 | ||
secalert@redhat.com | https://lists.apache.org/list.html?user%40poi.apache.org | ||
secalert@redhat.com | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/538981/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92100 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037741 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/list.html?user%40poi.apache.org | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A37C616-D64C-4067-91D5-0F288E4ABCEF", "versionEndIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." }, { "lang": "es", "value": "El ejemplo XLSX2CSV en Apache POI en versiones anteriores a 3.14 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de un documento OpenXML manipulado que contiene una declaraci\u00f3n de entidad externa en relaci\u00f3n con una referencia a entidad, relacionado con un problema XML External Entity (XXE)." } ], "id": "CVE-2016-5000", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:10.143", "references": [ { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/92100" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1037741" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-06 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html | ||
cve@mitre.org | http://poi.apache.org/changes.html | ||
cve@mitre.org | http://secunia.com/advisories/61953 | ||
cve@mitre.org | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
cve@mitre.org | http://www.securityfocus.com/bid/77726 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2016:1135 | ||
cve@mitre.org | https://issues.apache.org/bugzilla/show_bug.cgi?id=57272 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://poi.apache.org/changes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61953 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/77726 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1135 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/bugzilla/show_bug.cgi?id=57272 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 20 | |
apache | poi | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:beta3:*:*:*:*:*:*", "matchCriteriaId": "0E4D7997-8DE0-4D93-8C8C-E9D8EF6BC1F8", "versionEndIncluding": "3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." }, { "lang": "es", "value": "HSLFSlideShow en Apache POI anterior a 3.11 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y bloqueo) a trav\u00e9s de un fichero PPT manipulado." } ], "id": "CVE-2014-9527", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-06T15:59:05.727", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "source": "cve@mitre.org", "url": "http://poi.apache.org/changes.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61953" }, { "source": "cve@mitre.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/77726" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html | ||
security@debian.org | http://rhn.redhat.com/errata/RHSA-2012-1232.html | ||
security@debian.org | http://secunia.com/advisories/49040 | Vendor Advisory | |
security@debian.org | http://secunia.com/advisories/50549 | ||
security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
security@debian.org | http://www.debian.org/security/2012/dsa-2468 | ||
security@debian.org | http://www.mandriva.com/security/advisories?name=MDVSA-2013:094 | ||
security@debian.org | http://www.securityfocus.com/bid/53487 | ||
security@debian.org | https://bugzilla.redhat.com/show_bug.cgi?id=799078 | ||
security@debian.org | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-1232.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49040 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/50549 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2468 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2013:094 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53487 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=799078 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
apache | poi | 0.1 | |
apache | poi | 0.2 | |
apache | poi | 0.3 | |
apache | poi | 0.4 | |
apache | poi | 0.5 | |
apache | poi | 0.6 | |
apache | poi | 0.7 | |
apache | poi | 0.10.0 | |
apache | poi | 0.11.0 | |
apache | poi | 0.12.0 | |
apache | poi | 0.13.0 | |
apache | poi | 0.14.0 | |
apache | poi | 1.0.0 | |
apache | poi | 1.0.1 | |
apache | poi | 1.0.2 | |
apache | poi | 1.1.0 | |
apache | poi | 1.2.0 | |
apache | poi | 1.5 | |
apache | poi | 1.5.1 | |
apache | poi | 1.7 | |
apache | poi | 1.8 | |
apache | poi | 1.10 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.5 | |
apache | poi | 2.5.1 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0.1 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.2 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.6 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CDF1F8B-7A6A-4938-A36C-02985A7299C9", "versionEndIncluding": "3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." }, { "lang": "es", "value": "La funci\u00f3n UnhandledDataStructure en hwpf/model/UnhandledDataStructure.java en Apache POI v3.8 y anteriores permite a atacantes remotos earlier provocar una denegaci\u00f3n de servicio (excepci\u00f3n OutOfMemoryError y posiblemente desestabilizaci\u00f3n JVM) mediante un valor de longitud manipulado en un Channel Definition Format (CDF) o en un documento Compound File Binary Format (CFBF)." } ], "id": "CVE-2012-0213", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-07T21:55:01.093", "references": [ { "source": "security@debian.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49040" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/50549" }, { "source": "security@debian.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/53487" }, { "source": "security@debian.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "source": "security@debian.org", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-24 14:59
Modified
2025-04-20 01:37
Severity ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15 | Vendor Advisory | |
security@apache.org | http://www.securityfocus.com/bid/96983 | ||
security@apache.org | https://www.oracle.com/security-alerts/cpuoct2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96983 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E6BF2C-539C-4F80-A5CE-1B6BB3B08F31", "versionEndIncluding": "3.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." }, { "lang": "es", "value": "Apache POI en versiones anteriores al lanzamiento 3.15 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un archivo OOXML especialmente manipulado, vulnerabilidad tambi\u00e9n conocida como un ataque de XML Entity Expansion (XEE)." } ], "id": "CVE-2017-5644", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-24T14:59:00.273", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" }, { "source": "security@apache.org", "url": "http://www.securityfocus.com/bid/96983" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/96983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-776" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }