CVE-2018-17198

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2018-17198
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-17198.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-17198
Published
2019-05-28T18:29:00Z
Modified
2024-09-03T02:06:32.410563Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Server-side Request Forgery (SSRF) and File Enumeration vulnerability in Apache Roller 5.2.1, 5.2.0 and earlier unsupported versions relies on Java SAX Parser to implement its XML-RPC interface and by default that parser supports external entities in XML DOCTYPE, which opens Roller up to SSRF / File Enumeration vulnerability. Note that this vulnerability exists even if Roller XML-RPC interface is disable via the Roller web admin UI. Mitigation: There are a couple of ways you can fix this vulnerability: 1) Upgrade to the latest version of Roller, which is now 5.2.2 2) Or, edit the Roller web.xml file and comment out the XML-RPC Servlet mapping as shown below: <!-- <servlet-mapping> <servlet-name>XmlRpcServlet</servlet-name> <url-pattern>/roller-services/xmlrpc</url-pattern> </servlet-mapping> -->

References

Affected packages

Git / github.com/apache/roller

Affected ranges

Type
GIT
Repo
https://github.com/apache/roller
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Last affected

Affected versions

roller-5.*

roller-5.1.2
roller-5.2.1