Описание
OpenKM Community Edition in its 6.3.10 version and before was using XMLReader parser in XMLTextExtractor.java file without the required security flags, allowing an attacker to perform a XML external entity injection attack.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.3.10 (включая)
cpe:2.3:a:openkm:openkm:*:*:*:*:community:*:*:*
EPSS
Процентиль: 52%
0.00286
Низкий
8.5 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-611
CWE-611
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
OpenKM Community Edition in its 6.3.10 version and before was using XMLReader parser in XMLTextExtractor.java file without the required security flags, allowing an attacker to perform a XML external entity injection attack.
EPSS
Процентиль: 52%
0.00286
Низкий
8.5 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-611
CWE-611