- Added submission from Apache jUDDI from 2018-02-09.

This commit is contained in:
CVE Team 2018-02-09 13:32:09 -05:00
parent a8c4cd0bf3
commit 04303547e9
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56

View File

@ -1,8 +1,32 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "security@apache.org",
"DATE_PUBLIC" : "2017-11-10T00:00:00",
"ID" : "CVE-2018-1307",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "jUDDI",
"version" : {
"version_data" : [
{
"version_value" : "3.2 to 3.3.4"
}
]
}
}
]
},
"vendor_name" : "Apache Software Foundation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +35,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "If using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "XML Entity Expansion"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://issues.apache.org/jira/browse/JUDDI-987"
},
{
"url" : "http://juddi.apache.org/security.html"
}
]
}