Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01d2ZwLTg2NDMtYzU4eM4AAZnQ
Improper Input Validation in Apache POI
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Permalink: https://github.com/advisories/GHSA-5wfp-8643-c58xJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01d2ZwLTg2NDMtYzU4eM4AAZnQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 8 days ago
Identifiers: GHSA-5wfp-8643-c58x, CVE-2014-3574
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-3574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95768
- https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
- http://poi.apache.org/changes.html
- http://rhn.redhat.com/errata/RHSA-2014-1370.html
- http://rhn.redhat.com/errata/RHSA-2014-1398.html
- http://rhn.redhat.com/errata/RHSA-2014-1399.html
- http://rhn.redhat.com/errata/RHSA-2014-1400.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21996759
- http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
- https://svn.apache.org/repos/asf/poi/branches/REL_3_10_BRANCH@1616509
- https://svn.apache.org/repos/asf/poi/trunk@1615720
- https://svn.apache.org/repos/asf/poi/trunk@1615731
- https://svn.apache.org/repos/asf/poi/trunk@1615781
- https://github.com/advisories/GHSA-5wfp-8643-c58x
Affected Packages
maven:org.apache.poi:poi
Dependent packages: 2,109Dependent repositories: 75,041
Downloads:
Affected Version Ranges: = 3.11-beta1, < 3.10.1
Fixed in: 3.11-beta2, 3.10.1
All affected versions: 3.10.1, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2, 5.0.0, 5.1.0, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5
All unaffected versions: