cve/2024/CVE-2024-34345.md
2024-06-18 02:51:15 +02:00

20 lines
1.0 KiB
Markdown

### [CVE-2024-34345](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34345)
![](https://img.shields.io/static/v1?label=Product&message=cyclonedx-javascript-library&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3D%206.7.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brighgreen)
### Description
The CycloneDX JavaScript library contains the core functionality of OWASP CycloneDX for JavaScript. In 6.7.0, XML External entity injections were possible, when running the provided XML Validator on arbitrary input. This issue was fixed in version 6.7.1.
### POC
#### Reference
- https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203
- https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063
- https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7
#### Github
No PoCs found on GitHub currently.