Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p99p-726h-c8v5

Опубликовано: 19 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Apache juddi-client vulnerable to XML External Entity (XXE)

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

Пакеты

Наименование

org.apache.juddi:juddi-client

maven
Затронутые версииВерсия исправления

>= 3.2, < 3.3.5

3.3.5

EPSS

Процентиль: 78%
0.01116
Низкий

8.1 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 4.3
redhat
около 8 лет назад

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 8.1
nvd
почти 8 лет назад

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

EPSS

Процентиль: 78%
0.01116
Низкий

8.1 High

CVSS3

Дефекты

CWE-611