CVE-2018-11758 – org.apache.cayenne:cayenne-parent
Package
Manager: maven
Name: org.apache.cayenne:cayenne-parent
Vulnerable Version: >=0 <3.1.3 || >=4.0 <4.1
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00357 pctl0.57254
Details
XML External Entity Reference in Apache Cayenne This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.
Metadata
Created: 2022-05-14T02:02:28Z
Modified: 2022-11-04T20:37:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-85hw-w436-c725/GHSA-85hw-w436-c725.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-85hw-w436-c725
Finding: F083
Auto approve: 1