Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1307

Опубликовано: 10 нояб. 2017
Источник: redhat
CVSS3: 4.3

Описание

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

Отчет

No Red Hat products are affected by CVE-2018-1307.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 6juddi-clientNot affected
Red Hat JBoss Fuse 6juddi-clientNot affected
Red Hat JBoss Operations Network 3juddi-clientNot affected
Red Hat JBoss Portal 6juddi-clientNot affected
Red Hat JBoss SOA Platform 5juddi-clientNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-776
https://bugzilla.redhat.com/show_bug.cgi?id=1544034juddi-client: XML Entity Expansion in WADL2Java or WSDL2Java classes

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 8 лет назад

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 8.1
github
больше 7 лет назад

Apache juddi-client vulnerable to XML External Entity (XXE)

4.3 Medium

CVSS3