Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc3aHAtcGZ4dy00dzYz
XML External Entity (XXE) vulnerability in codelibs fess
codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.
Permalink: https://github.com/advisories/GHSA-77hp-pfxw-4w63JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc3aHAtcGZ4dy00dzYz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
CVSS Score: 10.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Identifiers: GHSA-77hp-pfxw-4w63, CVE-2018-1000822
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000822
- https://github.com/codelibs/fess/issues/1851
- https://0dd.zone/2018/10/27/fess-XXE/
- https://github.com/advisories/GHSA-77hp-pfxw-4w63
Blast Radius: 13.2
Affected Packages
maven:org.codelibs.fess:fess
Dependent packages: 23Dependent repositories: 21
Downloads:
Affected Version Ranges: < 12.3.2
Fixed in: 12.3.2
All affected versions: 10.2.1, 10.2.2, 10.2.3, 10.3.0, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.3.5, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, 11.0.5, 11.1.0, 11.1.1, 11.1.2, 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.3.0, 11.3.1, 11.3.2, 11.3.3, 11.3.4, 11.4.0, 11.4.1, 11.4.2, 11.4.3, 11.4.4, 11.4.5, 11.4.6, 11.4.7, 11.4.8, 11.4.9, 11.4.10, 11.4.11, 11.4.12, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.4, 12.1.5, 12.2.0, 12.2.1, 12.2.2, 12.2.3, 12.3.0, 12.3.1
All unaffected versions: 12.3.2, 12.3.3, 12.3.4, 12.3.5, 12.4.0, 12.4.1, 12.4.2, 12.4.3, 12.4.4, 12.5.0, 12.5.1, 12.5.2, 12.5.3, 12.6.0, 12.6.1, 12.6.2, 12.7.0, 13.0.0, 13.0.1, 13.0.2, 13.1.0, 13.1.1, 13.2.0, 13.2.1, 13.3.0, 13.3.1, 13.3.2, 13.3.3, 13.4.0, 13.4.1, 13.4.2, 13.4.3, 13.4.4, 13.4.5, 13.5.0, 13.5.1, 13.6.0, 13.6.1, 13.6.2, 13.6.3, 13.6.4, 13.7.0, 13.7.1, 13.7.2, 13.8.0, 13.8.1, 13.8.2, 13.9.0, 13.9.1, 13.9.2, 13.9.3, 13.10.0, 13.10.1, 13.10.2, 13.10.3, 13.10.4, 13.11.0, 13.11.1, 13.11.2, 13.11.3, 13.12.0, 13.12.1, 13.12.2, 13.13.0, 13.13.1, 13.13.2, 13.14.0, 13.14.1, 13.15.0, 13.15.1, 13.15.2, 13.15.3, 13.16.0, 14.0.0, 14.0.1, 14.1.0, 14.1.1, 14.2.0, 14.3.0, 14.4.0, 14.5.0, 14.6.0, 14.6.1, 14.7.0, 14.8.0, 14.9.0, 14.9.1, 14.10.0, 14.10.1, 14.11.0, 14.11.1, 14.12.0, 14.13.0, 14.14.0, 14.15.0, 14.16.0, 14.17.0, 14.18.0