Vulnerability CVE-2014-3004


Published: 2014-06-11

Description:
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.

Type:

CWE-611

(Information Exposure Through XML External Entity Reference)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Opensuse project -> Opensuse 
Opensuse -> Opensuse 
Novell -> Opensuse 
Castor project -> Castor 

 References:
http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html
http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
http://seclists.org/fulldisclosure/2014/May/142
http://secunia.com/advisories/59427
http://www.securityfocus.com/bid/67676
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811

Copyright 2024, cxsecurity.com

 

Back to Top