logo

CVE-2016-15011 be.e_contract.dssp:dssp-client

Package

Manager: maven
Name: be.e_contract.dssp:dssp-client
Vulnerable Version: >=0 <1.3.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0009 pctl0.26482

Details

dssp vulnerable to Improper Restriction of XML External Entity Reference A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function `checkSignResponse` of the file `dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java`. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 can address this issue. The name of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability.

Metadata

Created: 2023-01-06T12:31:34Z
Modified: 2023-01-12T23:42:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-77cc-w3wm-6whp/GHSA-77cc-w3wm-6whp.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-77cc-w3wm-6whp
Finding: F083
Auto approve: 1