Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-3600

Опубликовано: 26 нояб. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

РелизСтатусПримечание
devel

not-affected

3.1.3-2
hardy

ignored

end of life
lucid

ignored

end of life
maverick

not-affected

3.1.3-2
natty

not-affected

3.1.3-2
oneiric

not-affected

3.1.3-2
precise

not-affected

3.1.3-2
quantal

not-affected

3.1.3-2
raring

not-affected

3.1.3-2
saucy

not-affected

3.1.3-2

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
около 16 лет назад

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

CVSS3: 7.5
nvd
около 6 лет назад

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

CVSS3: 7.5
debian
около 6 лет назад

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler i ...

CVSS3: 7.5
github
почти 4 года назад

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

5 Medium

CVSS2

7.5 High

CVSS3