Description
The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5302 | The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration. |
Github GHSA |
GHSA-v723-58jv-2qc4 | Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML |
References
History
No history.
Subscriptions
Internet2
Subscribe
Opensaml
Subscribe
Redhat
Subscribe
Fuse Esb Enterprise
Subscribe
Fuse Management Console
Subscribe
Fuse Mq Enterprise
Subscribe
Jboss Bpms
Subscribe
Jboss Brms
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Portal Platform
Subscribe
Jboss Fuse Service Works
Subscribe
Shibboleth
Subscribe
Opensaml
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.299Z
Reserved: 2013-11-04T00:00:00.000Z
Link: CVE-2013-6440
No data.
Status : Deferred
Published: 2014-02-14T15:55:05.110
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-6440
OpenCVE Enrichment
No data.
EUVD
Github GHSA