GHSA-v723-58jv-2qc4

Suggest an improvement
Source
https://github.com/advisories/GHSA-v723-58jv-2qc4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v723-58jv-2qc4/GHSA-v723-58jv-2qc4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v723-58jv-2qc4
Aliases
  • CVE-2013-6440
Published
2022-05-13T01:04:00Z
Modified
2024-12-05T05:43:44.128655Z
Summary
Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML
Details

The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.

Database specific
{
    "nvd_published_at": "2014-02-14T15:55:00Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-07T23:18:33Z"
}
References

Affected packages

Maven / org.opensaml:opensaml

Package

Name
org.opensaml:opensaml
View open source insights on deps.dev
Purl
pkg:maven/org.opensaml/opensaml

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.1

Affected versions

1.*

1.1

2.*

2.1.0
2.2.0
2.2.1
2.2.3
2.4.1
2.5.1
2.5.1-1
2.5.3
2.6.0