logo

CVE-2020-10683 org.dom4j:dom4j

Package

Manager: maven
Name: org.dom4j:dom4j
Vulnerable Version: >=2.0.0 <2.0.3 || >=2.1.0 <2.1.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02443 pctl0.84597

Details

dom4j allows External Entities by default which might enable XXE attacks dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.

Metadata

Created: 2020-06-05T16:13:36Z
Modified: 2022-02-08T22:06:12Z
Source: MANUAL
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-hwj3-m3p6-hj38
Finding: F083
Auto approve: 1