logo

CVE-2020-15232 org.mapfish.print:print-standalone

Package

Manager: maven
Name: org.mapfish.print:print-standalone
Vulnerable Version: >=3.0 <3.24

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00342 pctl0.56154

Details

XXE attack in Mapfish Print ### Impact A user can do to an XML External Entity (XXE) attack with the provided SDL style. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://cwe.mitre.org/data/definitions/611.html * https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e ### For more information If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397

Metadata

Created: 2020-07-07T16:32:45Z
Modified: 2023-06-27T20:27:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-vjv6-gq77-3mjw/GHSA-vjv6-gq77-3mjw.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-vjv6-gq77-3mjw
Finding: F083
Auto approve: 1