CVE-2020-10683 - Improper Restriction of XML External Entity Reference

Severity

98%

Complexity

39%

Confidentiality

98%

dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.

CVSS 3.1 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

First reported 4 years ago

2020-05-01 19:15:00

Last updated 4 years ago

2020-12-03 17:15:00

Affected Software

Red Hat JBoss Enterprise Application Platform 7.0

7.0

Red Hat JBoss Fuse 7.0.0

7.0.0

Red Hat Process Automation 7.0

7.0

Red Hat Software Collections

Red Hat Enterprise Linux (RHEL) 7.0 (7)

7.0

Oracle Primavera P6 Enterprise Project Portfolio Management

Oracle Retail Integration Bus 15.0

15.0

Oracle Retail Integration Bus 16.0

16.0

OpenSUSE Leap 15.1

15.1

References

https://bugzilla.redhat.com/show_bug.cgi?id=1694235

https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658

https://github.com/dom4j/dom4j/releases/tag/version-2.1.3

https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html

https://bugzilla.redhat.com/show_bug.cgi?id=1694235

Issue Tracking, Patch, Third Party Advisory

https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html

Third Party Advisory

https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658

Patch, Third Party Advisory

https://github.com/dom4j/dom4j/releases/tag/version-2.1.3

Third Party Advisory

https://security.netapp.com/advisory/ntap-20200518-0002/

openSUSE-SU-2020:0719

https://www.oracle.com/security-alerts/cpujul2020.html

https://github.com/dom4j/dom4j/commits/version-2.0.3

https://github.com/dom4j/dom4j/issues/87

openSUSE-SU-2020:0719

Third Party Advisory

https://github.com/dom4j/dom4j/commits/version-2.0.3

Patch, Third Party Advisory

https://github.com/dom4j/dom4j/issues/87

Third Party Advisory

https://github.com/dom4j/dom4j/releases/tag/version-2.1.3

Release Notes, Third Party Advisory

https://security.netapp.com/advisory/ntap-20200518-0002/

Third Party Advisory

https://www.oracle.com/security-alerts/cpujul2020.html

Third Party Advisory

USN-4575-1

https://www.oracle.com/security-alerts/cpuoct2020.html

[velocity-dev] 20201203 Use of external DTDs - CVE-2020-10683

[velocity-dev] 20201203 Re: Use of external DTDs - CVE-2020-10683

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.