logo

CVE-2018-1307 org.apache.juddi:juddi-client

Package

Manager: maven
Name: org.apache.juddi:juddi-client
Vulnerable Version: >=3.2 <3.3.5

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01116 pctl0.77361

Details

Apache juddi-client vulnerable to XML External Entity (XXE) In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

Metadata

Created: 2018-10-19T16:42:15Z
Modified: 2022-09-14T19:12:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-p99p-726h-c8v5/GHSA-p99p-726h-c8v5.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-p99p-726h-c8v5
Finding: F083
Auto approve: 1