Vulnerability CVE-2020-10683


Published: 2020-05-01

Description:
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

Type:

CWE-611

(Information Exposure Through XML External Entity Reference)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Redhat -> Decision manager 
Redhat -> Jboss enterprise application platform 
Redhat -> Jboss enterprise application platform continuous delivery 
Redhat -> Jboss fuse 
Redhat -> Process automation 
Redhat -> Single sign-on 
Redhat -> Software collections 
Redhat -> Enterprise linux 
Dom4j project -> Dom4j 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=1694235
https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html
https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658
https://github.com/dom4j/dom4j/releases/tag/version-2.1.3

Copyright 2024, cxsecurity.com

 

Back to Top