Entity Expansion Vulnerability in Apache jUDDI by The Apache Software Foundation
CVE-2018-1307
8.1HIGH
Summary
In Apache jUDDI versions 3.2 through 3.3.4, there are inadequate protections against entity expansion and Document Type Definition (DTD) attacks when utilizing the WADL2Java or WSDL2Java classes to parse local or remote XML documents. This lack of safeguards can lead to XML-related attacks that may compromise the integrity and availability of the application. It is advisable to upgrade to version 3.3.5 or later to mitigate these security risks.
Affected Version(s)
Apache jUDDI 3.2 to 3.3.4
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved