CVE-2011-3600

Source
https://cve.org/CVERecord?id=CVE-2011-3600
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-3600.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-3600
Withdrawn
2024-06-30T15:56:25.087675Z
Published
2019-11-26T01:15:10Z
Modified
2024-06-04T04:00:19Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.

References

Affected packages

Debian:10 / libxmlrpc3-java

Package

Name
libxmlrpc3-java
Purl
pkg:deb/debian/libxmlrpc3-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3-1

Ecosystem specific

{
    "urgency": "low"
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-3600.json"