cvelist/2020/10xxx/CVE-2020-10683.json

127 lines
5.0 KiB
JSON
Raw Normal View History

2020-03-20 05:01:18 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-05-01 19:01:13 +00:00
"ID": "CVE-2020-10683",
"STATE": "PUBLIC"
2020-03-20 05:01:18 +00:00
},
2020-05-01 19:01:13 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-03-20 05:01:18 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-07-28 16:01:27 +00:00
"value": "dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j."
2020-05-01 19:01:13 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
2020-07-15 03:02:07 +00:00
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0719",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
2020-05-04 13:01:15 +00:00
{
"url": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html",
"refsource": "MISC",
"name": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"
},
2020-05-01 19:01:13 +00:00
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1694235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694235"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/dom4j/dom4j/releases/tag/version-2.1.3",
"url": "https://github.com/dom4j/dom4j/releases/tag/version-2.1.3"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658",
"url": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658"
2020-05-18 05:01:17 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0002/"
2020-07-28 16:01:27 +00:00
},
2020-10-20 22:03:07 +00:00
{
"refsource": "UBUNTU",
"name": "USN-4575-1",
"url": "https://usn.ubuntu.com/4575-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
2020-07-28 16:01:27 +00:00
{
"refsource": "MISC",
"name": "https://github.com/dom4j/dom4j/issues/87",
"url": "https://github.com/dom4j/dom4j/issues/87"
},
{
"refsource": "MISC",
"name": "https://github.com/dom4j/dom4j/commits/version-2.0.3",
"url": "https://github.com/dom4j/dom4j/commits/version-2.0.3"
2020-12-03 15:01:40 +00:00
},
{
"refsource": "MLIST",
"name": "[velocity-dev] 20201203 Use of external DTDs - CVE-2020-10683",
"url": "https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E"
2020-12-03 17:01:36 +00:00
},
{
"refsource": "MLIST",
"name": "[velocity-dev] 20201203 Re: Use of external DTDs - CVE-2020-10683",
"url": "https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E"
ill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan3rd Changes to be committed: modified: 2012/2xxx/CVE-2012-2098.json modified: 2015/4xxx/CVE-2015-4000.json modified: 2015/8xxx/CVE-2015-8965.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/5xxx/CVE-2017-5611.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/8xxx/CVE-2017-8028.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1285.json modified: 2018/20xxx/CVE-2018-20781.json modified: 2018/7xxx/CVE-2018-7318.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/9xxx/CVE-2018-9019.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0230.json modified: 2019/0xxx/CVE-2019-0233.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10744.json modified: 2019/11xxx/CVE-2019-11135.json modified: 2019/11xxx/CVE-2019-11269.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12399.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14862.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/1xxx/CVE-2019-1551.json modified: 2019/1xxx/CVE-2019-1559.json modified: 2019/20xxx/CVE-2019-20892.json modified: 2019/20xxx/CVE-2019-20907.json modified: 2019/3xxx/CVE-2019-3773.json modified: 2019/3xxx/CVE-2019-3778.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/7xxx/CVE-2019-7164.json modified: 2019/7xxx/CVE-2019-7548.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9513.json modified: 2020/10xxx/CVE-2020-10531.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10722.json modified: 2020/10xxx/CVE-2020-10723.json modified: 2020/10xxx/CVE-2020-10724.json modified: 2020/10xxx/CVE-2020-10725.json modified: 2020/10xxx/CVE-2020-10726.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11612.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11972.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/11xxx/CVE-2020-11984.json modified: 2020/11xxx/CVE-2020-11985.json modified: 2020/11xxx/CVE-2020-11993.json modified: 2020/11xxx/CVE-2020-11994.json modified: 2020/11xxx/CVE-2020-11996.json modified: 2020/11xxx/CVE-2020-11998.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13254.json modified: 2020/13xxx/CVE-2020-13596.json modified: 2020/13xxx/CVE-2020-13871.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13954.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14147.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/14xxx/CVE-2020-14422.json modified: 2020/15xxx/CVE-2020-15025.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/17xxx/CVE-2020-17498.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/1xxx/CVE-2020-1968.json modified: 2020/1xxx/CVE-2020-1971.json modified: 2020/24xxx/CVE-2020-24583.json modified: 2020/24xxx/CVE-2020-24584.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/25xxx/CVE-2020-25020.json modified: 2020/25xxx/CVE-2020-25862.json modified: 2020/25xxx/CVE-2020-25863.json modified: 2020/25xxx/CVE-2020-25866.json modified: 2020/26xxx/CVE-2020-26575.json modified: 2020/27xxx/CVE-2020-27216.json modified: 2020/35xxx/CVE-2020-35460.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/7xxx/CVE-2020-7064.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8265.json modified: 2020/8xxx/CVE-2020-8277.json modified: 2020/8xxx/CVE-2020-8287.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9490.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json
2021-01-19 13:08:08 -08:00
},
{
2021-01-20 15:02:47 +00:00
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
2020-03-20 05:01:18 +00:00
}
]
}
}