We found results for “”
CVE-2017-15691
Good to know:
Date: April 26, 2018
In Apache uimaj prior to 2.10.2, Apache uimaj 3.0.0-xxx prior to 3.0.0-beta, Apache uima-as prior to 2.10.2, Apache uimaFIT prior to 2.4.0, Apache uimaDUCC prior to 2.2.2, this vulnerability relates to an XML external entity expansion (XXE) capability of various XML parsers. UIMA as part of its configuration and operation may read XML from various sources, which could be tainted in ways to cause inadvertent disclosure of local files or other internal content.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Restriction of XML External Entity Reference
CWE-611Top Fix
Upgrade Version
Upgrade to version org.apache.uima:uimaj-core:3.0.0-beta;org.apache.uima:uimaj-core:2.10.2;org.apache.uima:uimafit-core:2.4.0;org.apache.uima:uimaj-as-core:2.10.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | SINGLE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | NONE |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


