Описание
Improper Restriction of XML External Entity Reference in Castor
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-3004
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html
- http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
- http://seclists.org/fulldisclosure/2014/May/142
Пакеты
org.codehaus.castor:castor
< 1.3.3
1.3.3
org.castor:castor
<= 1.0
Отсутствует
Связанные уязвимости
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.