Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc3aHAtcGZ4dy00dzYz

XML External Entity (XXE) vulnerability in codelibs fess

codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.

Permalink: https://github.com/advisories/GHSA-77hp-pfxw-4w63
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc3aHAtcGZ4dy00dzYz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago


CVSS Score: 10.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Identifiers: GHSA-77hp-pfxw-4w63, CVE-2018-1000822
References: Repository: https://github.com/codelibs/fess
Blast Radius: 13.2

Affected Packages

maven:org.codelibs.fess:fess
Dependent packages: 23
Dependent repositories: 21
Downloads:
Affected Version Ranges: < 12.3.2
Fixed in: 12.3.2
All affected versions: 10.2.1, 10.2.2, 10.2.3, 10.3.0, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.3.5, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, 11.0.5, 11.1.0, 11.1.1, 11.1.2, 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.3.0, 11.3.1, 11.3.2, 11.3.3, 11.3.4, 11.4.0, 11.4.1, 11.4.2, 11.4.3, 11.4.4, 11.4.5, 11.4.6, 11.4.7, 11.4.8, 11.4.9, 11.4.10, 11.4.11, 11.4.12, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.4, 12.1.5, 12.2.0, 12.2.1, 12.2.2, 12.2.3, 12.3.0, 12.3.1
All unaffected versions: 12.3.2, 12.3.3, 12.3.4, 12.3.5, 12.4.0, 12.4.1, 12.4.2, 12.4.3, 12.4.4, 12.5.0, 12.5.1, 12.5.2, 12.5.3, 12.6.0, 12.6.1, 12.6.2, 12.7.0, 13.0.0, 13.0.1, 13.0.2, 13.1.0, 13.1.1, 13.2.0, 13.2.1, 13.3.0, 13.3.1, 13.3.2, 13.3.3, 13.4.0, 13.4.1, 13.4.2, 13.4.3, 13.4.4, 13.4.5, 13.5.0, 13.5.1, 13.6.0, 13.6.1, 13.6.2, 13.6.3, 13.6.4, 13.7.0, 13.7.1, 13.7.2, 13.8.0, 13.8.1, 13.8.2, 13.9.0, 13.9.1, 13.9.2, 13.9.3, 13.10.0, 13.10.1, 13.10.2, 13.10.3, 13.10.4, 13.11.0, 13.11.1, 13.11.2, 13.11.3, 13.12.0, 13.12.1, 13.12.2, 13.13.0, 13.13.1, 13.13.2, 13.14.0, 13.14.1, 13.15.0, 13.15.1, 13.15.2, 13.15.3, 13.16.0, 14.0.0, 14.0.1, 14.1.0, 14.1.1, 14.2.0, 14.3.0, 14.4.0, 14.5.0, 14.6.0, 14.6.1, 14.7.0, 14.8.0, 14.9.0, 14.9.1, 14.10.0, 14.10.1, 14.11.0, 14.11.1, 14.12.0, 14.13.0, 14.14.0, 14.15.0, 14.16.0, 14.17.0, 14.18.0