In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0651 In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
Github GHSA Github GHSA GHSA-p99p-726h-c8v5 Apache juddi-client vulnerable to XML External Entity (XXE)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-16T19:24:28.480Z

Reserved: 2017-12-07T00:00:00

Link: CVE-2018-1307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-09T19:29:00.227

Modified: 2024-11-21T03:59:35.573

Link: CVE-2018-1307

cve-icon Redhat

Severity : Low

Publid Date: 2017-11-10T00:00:00Z

Links: CVE-2018-1307 - Bugzilla

cve-icon OpenCVE Enrichment

No data.