cve/2024/CVE-2024-40896.md
2025-09-29 21:09:30 +02:00

20 lines
988 B
Markdown

### [CVE-2024-40896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40896)
![](https://img.shields.io/static/v1?label=Product&message=libxml2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.11.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.12.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.13.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brightgreen)
### Description
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible.
### POC
#### Reference
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/761
#### Github
No PoCs found on GitHub currently.