GHSA-v62g-jwj9-rfvx

Suggest an improvement
Source
https://github.com/advisories/GHSA-v62g-jwj9-rfvx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-v62g-jwj9-rfvx/GHSA-v62g-jwj9-rfvx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v62g-jwj9-rfvx
Aliases
  • CVE-2023-48362
Published
2024-07-24T09:30:40Z
Modified
2024-09-10T19:06:10.290619Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
XML External Entity Reference (XXE) in the XML Format Plugin in Apache Drill
Details

XXE in the XML Format Plugin in Apache Drill version 1.19.0 and greater allows a user to read any file on a remote file system or execute commands via a malicious XML file. Users are recommended to upgrade to version 1.21.2, which fixes this issue.

References

Affected packages

Maven / org.apache.drill.exec:drill-java-exec

Package

Name
org.apache.drill.exec:drill-java-exec
View open source insights on deps.dev
Purl
pkg:maven/org.apache.drill.exec/drill-java-exec

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.19.0
Fixed
1.21.2

Affected versions

1.*

1.19.0
1.20.0
1.20.0-hadoop2
1.20.2
1.21.0
1.21.1