The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5302 The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.
Github GHSA Github GHSA GHSA-v723-58jv-2qc4 Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T17:39:01.299Z

Reserved: 2013-11-04T00:00:00

Link: CVE-2013-6440

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-02-14T15:55:05.110

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-6440

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-12-11T00:00:00Z

Links: CVE-2013-6440 - Bugzilla

cve-icon OpenCVE Enrichment

No data.