Show plain JSON{"id": "CVE-2014-3529", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-09-04T17:55:05.623", "references": [{"url": "http://poi.apache.org/changes.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/59943", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/60419", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/61766", "source": "secalert@redhat.com"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "source": "secalert@redhat.com"}, {"url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/69647", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/78018", "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", "source": "secalert@redhat.com"}, {"url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://poi.apache.org/changes.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/59943", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/60419", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/61766", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/69647", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/78018", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."}, {"lang": "es", "value": "La configuraci\u00f3n de OPC SAX en Apache POI anterior a 3.10.1 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de un fichero OpenXML que contiene una declaraci\u00f3n de entidad externa XML en conjunto con una referencia de entidad, relacionado con un problema de entidad externa XML (XXE)."}], "lastModified": "2024-11-21T02:08:18.587", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", "versionEndIncluding": "3.10"}, {"criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450"}, {"criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095"}, {"criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7"}, {"criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99"}, {"criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F"}, {"criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E"}, {"criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF"}, {"criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5"}, {"criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC"}, {"criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3"}, {"criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A"}, {"criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255"}, {"criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA"}, {"criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19"}, {"criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796"}, {"criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57"}, {"criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372"}, {"criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756"}, {"criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4"}, {"criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3"}, {"criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4"}, {"criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F"}, {"criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B"}, {"criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD"}, {"criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D"}, {"criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E"}, {"criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E"}, {"criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97"}, {"criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650"}, {"criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B"}, {"criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF"}, {"criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433"}, {"criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6"}, {"criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308"}, {"criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6"}, {"criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C"}, {"criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997"}, {"criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6"}, {"criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493"}, {"criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72"}, {"criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885"}, {"criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C"}, {"criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1501370-BC00-4456-9A52-EE4E9899567A"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7"}, {"criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10"}, {"criteria": "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9"}, {"criteria": "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD7E734A-22C1-4895-AE1F-2EB87126EBA7"}, {"criteria": "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121"}], "operator": "OR"}]}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>", "sourceIdentifier": "secalert@redhat.com"}