Description
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Published: 2014-09-04
Score: 4.3 Medium
EPSS: 5.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4891 The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Github GHSA Github GHSA GHSA-q56h-jjj6-52mf Improper Restriction of XML External Entity Reference in Apache POI
History

No history.

Subscriptions

Apache Poi
Redhat Jboss Bpms Jboss Brms Jboss Data Virtualization Jboss Enterprise Portal Platform Jboss Fuse Service Works
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:16.343Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3529

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-09-04T17:55:05.623

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3529

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-08-18T00:00:00Z

Links: CVE-2014-3529 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses