Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3529

Опубликовано: 04 сент. 2014
Источник: debian

Описание

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libapache-poi-javafixed3.10.1-1package
libapache-poi-javano-dsawheezypackage

Примечания

  • https://issues.apache.org/bugzilla/show_bug.cgi?id=56164

Связанные уязвимости

ubuntu
больше 11 лет назад

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

redhat
больше 11 лет назад

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

nvd
больше 11 лет назад

The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

github
больше 3 лет назад

Improper Restriction of XML External Entity Reference in Apache POI