Описание
When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.
It was found that the Spring Framework did not, by default, disable the resolution of URI references in a DTD declaration when processing user-provided XML documents. By observing differences in response times, an attacker could identify valid IP addresses on the internal network with functioning web servers.
Отчет
Red Hat OpenShift Enterprise 1.2 is now in Production 1 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat OpenShift Enterprise Life Cycle: https://access.redhat.com/site/support/policy/updates/openshift.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
OpenShift Enterprise 1 | activemq | Will not fix | ||
Red Hat BPM Suite 6 | spring | Not affected | ||
Red Hat Enterprise Virtualization 3 | jasperreports-server-pro | Affected | ||
Red Hat JBoss BRMS 6 | spring | Not affected | ||
Red Hat JBoss Enterprise Application Platform 5 | spring | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | amq-6 | Affected | ||
Red Hat JBoss Enterprise Web Server 1 | fuse-6 | Affected | ||
Red Hat JBoss Enterprise Web Server 1 | fuse-enterprise-esb-7 | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | fuse-mb-5 | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | fuse-mq-enterprise-7 | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS2
Связанные уязвимости
When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.
When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.
When processing user provided XML documents, the Spring Framework 4.0. ...
Improper Restriction of XML External Entity Reference in Spring Framework
EPSS
5 Medium
CVSS2