In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0651 | In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5. |
Github GHSA |
GHSA-p99p-726h-c8v5 | Apache juddi-client vulnerable to XML External Entity (XXE) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T19:24:28.480Z
Reserved: 2017-12-07T00:00:00
Link: CVE-2018-1307
No data.
Status : Modified
Published: 2018-02-09T19:29:00.227
Modified: 2024-11-21T03:59:35.573
Link: CVE-2018-1307
OpenCVE Enrichment
No data.
EUVD
Github GHSA