Entity Expansion Vulnerability in Apache jUDDI by The Apache Software Foundation
CVE-2018-1307

8.1HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
9 February 2018

Summary

In Apache jUDDI versions 3.2 through 3.3.4, there are inadequate protections against entity expansion and Document Type Definition (DTD) attacks when utilizing the WADL2Java or WSDL2Java classes to parse local or remote XML documents. This lack of safeguards can lead to XML-related attacks that may compromise the integrity and availability of the application. It is advisable to upgrade to version 3.3.5 or later to mitigate these security risks.

Affected Version(s)

Apache jUDDI 3.2 to 3.3.4

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.