Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6fhj-vr9j-g45r

Опубликовано: 10 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection

Impact

The XML Validator used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection.

The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed parsing of XML BOMs, but not validation.

Patches

The vulnerability has been fixed in cyclonedx-core-java version 11.0.1.

Workarounds

If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

References

Пакеты

Наименование

org.cyclonedx:cyclonedx-core-java

maven
Затронутые версииВерсия исправления

>= 2.1.0, < 11.0.1

11.0.1

EPSS

Процентиль: 23%
0.00078
Низкий

7.5 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.5
nvd
3 месяца назад

The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Starting in version 2.1.0 and prior to version 11.0.1, the XML `Validator` used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 was incomplete in that it only fixed parsing of XML BOMs, but not validation. The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. As a workaround, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format.

EPSS

Процентиль: 23%
0.00078
Низкий

7.5 High

CVSS3

Дефекты

CWE-611