Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qd3dyLWZqZ2gtY3YyeM3r0Q
Improper Restriction of XML External Entity Reference in Castor
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Permalink: https://github.com/advisories/GHSA-jwwr-fjgh-cv2xJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qd3dyLWZqZ2gtY3YyeM3r0Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-jwwr-fjgh-cv2x, CVE-2014-3004
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-3004
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html
- http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
- http://seclists.org/fulldisclosure/2014/May/142
- https://github.com/advisories/GHSA-jwwr-fjgh-cv2x
Affected Packages
maven:org.codehaus.castor:castor
Dependent packages: 47Dependent repositories: 853
Downloads:
Affected Version Ranges: < 1.3.3
Fixed in: 1.3.3
All affected versions: 1.0.4, 1.0.5, 1.1.1, 1.1.2, 1.3.1, 1.3.2
All unaffected versions: 1.3.3, 1.4.1