cve/2024/CVE-2024-40896.md

20 lines
988 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-40896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40896)
![](https://img.shields.io/static/v1?label=Product&message=libxml2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.11.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.12.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.13.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brightgreen)
### Description
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible.
### POC
#### Reference
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/761
#### Github
No PoCs found on GitHub currently.