mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
157 lines
6.5 KiB
JSON
157 lines
6.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2020-10683",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:0719",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujul2020.html"
|
|
},
|
|
{
|
|
"url": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html",
|
|
"refsource": "MISC",
|
|
"name": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1694235",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694235"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://github.com/dom4j/dom4j/releases/tag/version-2.1.3",
|
|
"url": "https://github.com/dom4j/dom4j/releases/tag/version-2.1.3"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658",
|
|
"url": "https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20200518-0002/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20200518-0002/"
|
|
},
|
|
{
|
|
"refsource": "UBUNTU",
|
|
"name": "USN-4575-1",
|
|
"url": "https://usn.ubuntu.com/4575-1/"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/dom4j/dom4j/issues/87",
|
|
"url": "https://github.com/dom4j/dom4j/issues/87"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/dom4j/dom4j/commits/version-2.0.3",
|
|
"url": "https://github.com/dom4j/dom4j/commits/version-2.0.3"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[velocity-dev] 20201203 Use of external DTDs - CVE-2020-10683",
|
|
"url": "https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[velocity-dev] 20201203 Re: Use of external DTDs - CVE-2020-10683",
|
|
"url": "https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[freemarker-notifications] 20210906 [jira] [Created] (FREEMARKER-190) The jar dom4j has known security issue that Freemarker compiles dependend on it",
|
|
"url": "https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
|
}
|
|
]
|
|
}
|
|
} |