[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3004Date: (C)2014-06-16   (M)2023-12-22


The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://seclists.org/fulldisclosure/2014/May/142
SECUNIA-59427
BID-67676
http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
openSUSE-SU-2014:0822

CPE    3
cpe:/o:opensuse:opensuse:13.1
cpe:/a:castor_project:castor:1.3.1
cpe:/a:castor_project:castor:1.3
CWE    1
CWE-611
OVAL    2
oval:org.secpod.oval:def:108139
oval:org.secpod.oval:def:108036

© SecPod Technologies