GHSA-77cc-w3wm-6whp

Suggest an improvement
Source
https://github.com/advisories/GHSA-77cc-w3wm-6whp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-77cc-w3wm-6whp/GHSA-77cc-w3wm-6whp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-77cc-w3wm-6whp
Aliases
Published
2023-01-06T12:31:34Z
Modified
2023-11-08T03:58:22.442921Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
dssp vulnerable to Improper Restriction of XML External Entity Reference
Details

A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function checkSignResponse of the file dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 can address this issue. The name of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2023-01-06T10:15:00Z",
    "github_reviewed_at": "2023-01-12T23:42:07Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-611"
    ]
}
References

Affected packages

Maven / be.e_contract.dssp:dssp-client

Package

Name
be.e_contract.dssp:dssp-client
View open source insights on deps.dev
Purl
pkg:maven/be.e_contract.dssp/dssp-client

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2