Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8g38-jgjc-p9jh

Опубликовано: 14 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 4.4

Описание

When the XML is read from the codes in the PDF and parsed using a DocumentBuilder, the default settings of the DocumentBuilder allow for an XXE (XML External Entity) attack. Further information on this can be found on the website of the Open Worldwide Application Security Project (OWASP). An attacker could theoretically leverage this by delivering a manipulated PDF file to the target, and depending on the environment, various actions can be executed. These actions include:

  • Reading files from the operating system
  • Crashing the thread handling the parsing or causing it to enter an infinite loop
  • Executing HTTP requests
  • Loading additional DTDs or XML files
  • Under certain conditions, executing OS commands

When the XML is read from the codes in the PDF and parsed using a DocumentBuilder, the default settings of the DocumentBuilder allow for an XXE (XML External Entity) attack. Further information on this can be found on the website of the Open Worldwide Application Security Project (OWASP). An attacker could theoretically leverage this by delivering a manipulated PDF file to the target, and depending on the environment, various actions can be executed. These actions include:

  • Reading files from the operating system
  • Crashing the thread handling the parsing or causing it to enter an infinite loop
  • Executing HTTP requests
  • Loading additional DTDs or XML files
  • Under certain conditions, executing OS commands

EPSS

Процентиль: 40%
0.00185
Низкий

4.4 Medium

CVSS4

Дефекты

CWE-611

Связанные уязвимости

nvd
больше 1 года назад

When the XML is read from the codes in the PDF and parsed using a DocumentBuilder, the default settings of the DocumentBuilder allow for an XXE (XML External Entity) attack. Further information on this can be found on the website of the Open Worldwide Application Security Project (OWASP). An attacker could theoretically leverage this by delivering a manipulated PDF file to the target, and depending on the environment, various actions can be executed. These actions include: * Reading files from the operating system * Crashing the thread handling the parsing or causing it to enter an infinite loop * Executing HTTP requests * Loading additional DTDs or XML files * Under certain conditions, executing OS commands

EPSS

Процентиль: 40%
0.00185
Низкий

4.4 Medium

CVSS4

Дефекты

CWE-611