Processing Foundation Processing version 3.4 and earlier contains a XML External Entity (XXE) vulnerability in loadXML() function that can result in An attacker can read arbitrary files and exfiltrate their contents via HTTP requests. This attack appear to be exploitable via The victim must use Processing to parse a crafted XML document.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/processing/processing/issues/5706 | Exploit Patch Third Party Advisory | 
| https://twitter.com/ben_fry/status/1054333613465059329 | Third Party Advisory | 
| https://github.com/processing/processing/issues/5706 | Exploit Patch Third Party Advisory | 
| https://twitter.com/ben_fry/status/1054333613465059329 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/processing/processing/issues/5706 - Exploit, Patch, Third Party Advisory | |
| References | () https://twitter.com/ben_fry/status/1054333613465059329 - Third Party Advisory | 
Information
                Published : 2018-12-20 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000840
Mitre link : CVE-2018-1000840
CVE.ORG link : CVE-2018-1000840
JSON object : View
Products Affected
                processing
- processing
CWE
                
                    
                        
                        CWE-611
                        
            Improper Restriction of XML External Entity Reference
