The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5302 | The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration. |
Github GHSA |
GHSA-v723-58jv-2qc4 | Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.299Z
Reserved: 2013-11-04T00:00:00
Link: CVE-2013-6440
No data.
Status : Deferred
Published: 2014-02-14T15:55:05.110
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-6440
OpenCVE Enrichment
No data.
EUVD
Github GHSA