This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105142 - Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/ed60a4d329be3c722f105317ca883986dfcd17615c70d1df87f4528c%40%3Cuser.cayenne.apache.org%3E - |
Information
Published : 2018-08-22 20:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11758
Mitre link : CVE-2018-11758
CVE.ORG link : CVE-2018-11758
JSON object : View
Products Affected
apache
- cayenne
CWE
CWE-611
Improper Restriction of XML External Entity Reference