logo

CVE-2020-10683 dom4j:dom4j

Package

Manager: maven
Name: dom4j:dom4j
Vulnerable Version: >=0 <=1.6.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02443 pctl0.84604

Details

dom4j allows External Entities by default which might enable XXE attacks dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.

Metadata

Created: 2020-06-05T16:13:36Z
Modified: 2022-02-08T22:06:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-hwj3-m3p6-hj38/GHSA-hwj3-m3p6-hj38.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-hwj3-m3p6-hj38
Finding: F083
Auto approve: 1