Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04NWh3LXc0MzYtYzcyNc4AAU6Q

XML External Entity Reference in Apache Cayenne

This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.

Permalink: https://github.com/advisories/GHSA-85hw-w436-c725
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04NWh3LXc0MzYtYzcyNc4AAU6Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 8.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Identifiers: GHSA-85hw-w436-c725, CVE-2018-11758
References: Blast Radius: 1.0

Affected Packages

maven:org.apache.cayenne:cayenne-parent
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 4.0, < 4.1, < 3.1.3
Fixed in: 4.1, 3.1.3
All affected versions: 3.0.1, 3.0.2, 3.1.1, 3.1.2, 4.0.1, 4.0.2, 4.0.3
All unaffected versions: 3.1.3, 4.1.1