XML External Entity Vulnerability in Apache Cocoon StreamGenerator
CVE-2020-11991
7.5HIGH
Summary
The vulnerability in the StreamGenerator of Apache Cocoon arises from the handling of user-provided XML data, which is subject to external entity processing. By crafting a malicious XML request that exploits this feature, an attacker can potentially gain unauthorized access to sensitive files on the server. This exposes significant risks to server integrity and confidentiality, as it allows the possibility of reading files and executing further attacks.
Affected Version(s)
Apache Cocoon Apache Cocoon 2.1.0 to 2.1.12
References
EPSS Score
89% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved