CVE-2017-12621 – commons-jelly:commons-jelly
Package
Manager: maven
Name: commons-jelly:commons-jelly
Vulnerable Version: >=0 <1.0.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00465 pctl0.63403
Details
Improper Restriction of XML External Entity Reference in Jelly During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly before 1.0.1.
Metadata
Created: 2022-05-17T00:34:13Z
Modified: 2022-07-01T20:33:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6g33-82gc-3pw5/GHSA-6g33-82gc-3pw5.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-6g33-82gc-3pw5
Finding: F083
Auto approve: 1