Описание
A vulnerability was found in zwczou WeChat SDK Python 0.3.0 and classified as critical. This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. Upgrading to version 0.5.5 is able to address this issue. The patch is named e54abadc777715b6dcb545c13214d1dea63df6c9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223403.
Ссылки
- Patch
- PatchThird Party Advisory
- Release Notes
- Permissions RequiredThird Party Advisory
- Third Party Advisory
- Patch
- PatchThird Party Advisory
- Release Notes
- Permissions RequiredThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.5.5 (исключая)
cpe:2.3:a:wechat_sdk_python_project:wechat_sdk_python:*:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00143
Низкий
6.3 Medium
CVSS3
9.8 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-611
CWE-611
Связанные уязвимости
CVSS3: 9.8
github
почти 3 года назад
weixin-python XML External Entity vulnerability
EPSS
Процентиль: 35%
0.00143
Низкий
6.3 Medium
CVSS3
9.8 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-611
CWE-611