2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2018-1307" ,
"sourceIdentifier" : "security@apache.org" ,
"published" : "2018-02-09T19:29:00.227" ,
2024-11-23 09:11:19 +00:00
"lastModified" : "2024-11-21T03:59:35.573" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5."
} ,
{
"lang" : "es" ,
"value" : "En Apache jUDDI 3.2 hasta 3.3.4, si se usan las clases WADL2Java o WSDL2Java, que analizan un documento XML local o remoto y luego convierten las estructuras de datos en estructuras de datos UDDI, hay pocas protecciones contra ataques de expansi\u00f3n de entidad y DTD. La soluci\u00f3n es emplear la versi\u00f3n 3.3.5."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 09:11:19 +00:00
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 09:11:19 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-11-23 09:11:19 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 09:11:19 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-611"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:juddi:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.2" ,
"versionEndIncluding" : "3.3.4" ,
"matchCriteriaId" : "B35A9FEC-8DEA-4BA1-B62A-9C66A4C01408"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://juddi.apache.org/security.html" ,
"source" : "security@apache.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://issues.apache.org/jira/browse/JUDDI-987" ,
"source" : "security@apache.org" ,
"tags" : [
"Issue Tracking" ,
"Patch" ,
"Vendor Advisory"
]
2024-11-23 09:11:19 +00:00
} ,
{
"url" : "http://juddi.apache.org/security.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://issues.apache.org/jira/browse/JUDDI-987" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}