logo

CVE-2015-1833 org.apache.jackrabbit:jackrabbit-core

Package

Manager: maven
Name: org.apache.jackrabbit:jackrabbit-core
Vulnerable Version: >=0 <2.0.6 || >=2.2.0 <2.2.14 || >=2.4.0 <2.4.6 || >=2.6.0 <2.6.6 || =2.8.0 || >=2.8.0 <2.8.1 || =2.10.0 || >=2.10.0 <2.10.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.30217 pctl0.96531

Details

Improper Input Validation in Apache Jackrabbit XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.

Metadata

Created: 2022-05-14T02:49:30Z
Modified: 2024-04-12T21:44:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9284-j4c9-779q/GHSA-9284-j4c9-779q.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-9284-j4c9-779q
Finding: F184
Auto approve: 1