[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-12621 -- libjenkins-commons-jelly-java

ID: oval:org.secpod.oval:def:1901607Date: (C)2019-03-12   (M)2023-12-20
Class: VULNERABILITYFamily: unix




During Jelly file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity attacks in Apache Commons Jelly before 1.0.1.

Platform:
Ubuntu 16.04
Ubuntu 14.04
Product:
libjenkins-commons-jelly-java
Reference:
CVE-2017-12621
CVE    1
CVE-2017-12621
CPE    3
cpe:/o:ubuntu:ubuntu_linux:16.04
cpe:/o:ubuntu:ubuntu_linux:14.04
cpe:/a:apache:libjenkins-commons-jelly-java

© SecPod Technologies