Описание
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
Меры по смягчению последствий
Application parsing untrusted input with libxml2 should be careful to NOT use entity expansion (enabled by XML_PARSE_NOENT) or DTD validation (XML_PARSE_DTDLOAD, XML_PARSE_DTDVALID) on such input.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | libxml2 | Will not fix | ||
| Red Hat Enterprise Linux 6 | libxml2 | Will not fix | ||
| Red Hat Enterprise Linux 7 | libxml2 | Will not fix | ||
| Red Hat JBoss Core Services | httpd | Affected | ||
| Red Hat JBoss Enterprise Web Server 1 | libxml2 | Under investigation | ||
| Text-Only JBCS | Fixed | RHSA-2018:2486 | 16.08.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.7 Medium
CVSS3
5.8 Medium
CVSS2
Связанные уязвимости
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and ot ...
EPSS
6.7 Medium
CVSS3
5.8 Medium
CVSS2