Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hqw5-62gp-rqgm

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Exposure of Sensitive Information to an Unauthorized Actor in Direct Web Remoting

The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Пакеты

Наименование

org.directwebremoting:dwr

maven
Затронутые версииВерсия исправления

< 2.0.11

2.0.11

Наименование

org.directwebremoting:dwr

maven
Затронутые версииВерсия исправления

>= 3.0.M1, <= 3.0.RC2

3.0.RC3

EPSS

Процентиль: 70%
0.00633
Низкий

Дефекты

CWE-200

Связанные уязвимости

redhat
около 11 лет назад

The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

nvd
около 11 лет назад

The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

debian
около 11 лет назад

The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) X ...

EPSS

Процентиль: 70%
0.00633
Низкий

Дефекты

CWE-200