During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly before 1.0.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2787 | During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a "SYSTEM" entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly before 1.0.1. |
Github GHSA |
GHSA-6g33-82gc-3pw5 | Improper Restriction of XML External Entity Reference in Jelly |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T16:14:10.234Z
Reserved: 2017-08-07T00:00:00
Link: CVE-2017-12621
No data.
Status : Deferred
Published: 2017-09-28T01:29:01.293
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-12621
OpenCVE Enrichment
No data.
EUVD
Github GHSA